chen-keinan / mesh-kridikLinks
mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and is leveraged by OPA (Open Policy Agent) to enforce security rules.
☆27Updated 7 months ago
Alternatives and similar repositories for mesh-kridik
Users that are interested in mesh-kridik are comparing it to the libraries listed below
Sorting:
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- FACT is a tool to collect, process and visualise forensic data from clusters of machines running in the cloud or on-premise.☆18Updated 10 months ago
- A basic proxylogon scanner☆27Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆58Updated last year
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆16Updated 5 months ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- A productivity burp extension which reminds to take break while you are at work!☆17Updated 5 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- A wrapper around ripgrep to check for various common patterns.☆13Updated 5 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Updated 4 years ago
- Go module that returns supported regions for a service or supported services for a region☆16Updated last year
- Simple utility to manage multiple ssh☆15Updated 2 years ago
- Swiftly search FDNS datasets from Rapid7 Open Data☆22Updated 2 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- CloudSpec is an open source tool for validating your resources in your cloud providers using a logical language.☆26Updated 3 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 6 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Updated 4 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆26Updated 4 years ago
- Tool for reconnaissance of AWS cloud environments☆13Updated last year
- Tools for auditing WAFS☆19Updated 3 years ago
- Security checks for your researches☆34Updated 4 years ago
- Docker container for running OWASP WebGoat.NET application☆11Updated 7 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 5 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago