chen-keinan / mesh-kridikLinks
mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and is leveraged by OPA (Open Policy Agent) to enforce security rules.
☆28Updated 11 months ago
Alternatives and similar repositories for mesh-kridik
Users that are interested in mesh-kridik are comparing it to the libraries listed below
Sorting:
- A basic proxylogon scanner☆27Updated 4 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated 2 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- Go module that returns supported regions for a service or supported services for a region☆17Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Updated 4 years ago
- Exactly what it sounds like, which is something rad☆23Updated 3 years ago
- Default plugins for Jaeles Scanner☆35Updated 5 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- client-side prototype pullution vulnerability scanner☆46Updated 4 years ago
- Dependency Combobulator☆93Updated last year
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 3 years ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- Burp Extension for AWS Signing☆89Updated 10 months ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- ⚡️ Multiple target ZAP Scanning☆105Updated last year
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆16Updated 10 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Updated 4 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆17Updated 4 years ago
- ☆10Updated 6 years ago
- Ideaslocas Repository☆37Updated 4 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Updated 5 years ago
- ☆13Updated last year
- Log converter from CS log to Ghostwriter CSV☆31Updated 4 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆15Updated 6 months ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Updated last week