chen-keinan / mesh-kridikLinks
mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and is leveraged by OPA (Open Policy Agent) to enforce security rules.
☆27Updated last year
Alternatives and similar repositories for mesh-kridik
Users that are interested in mesh-kridik are comparing it to the libraries listed below
Sorting:
- A basic proxylogon scanner☆27Updated 4 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Take domains on stdin and output them on stdout if they get resolved☆32Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆58Updated 2 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Updated 3 weeks ago
- Default plugins for Jaeles Scanner☆35Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Updated 4 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- Dependency Combobulator☆95Updated last year
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Updated 3 weeks ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 3 years ago
- Validate proxies for specific domain☆38Updated 4 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆15Updated 7 months ago
- ☆13Updated last year
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- Log converter from CS log to Ghostwriter CSV☆31Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 5 years ago
- ☆30Updated last year
- ☆10Updated 7 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Updated 4 years ago
- Python Script for SAML2 Authentication Passwordspray☆42Updated 2 years ago
- Extract credentials from lsass remotely☆16Updated 6 years ago
- Simple S3 Bucket Testing Software☆31Updated 4 years ago