mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and is leveraged by OPA (Open Policy Agent) to enforce security rules.
☆27Dec 9, 2024Updated last year
Alternatives and similar repositories for mesh-kridik
Users that are interested in mesh-kridik are comparing it to the libraries listed below
Sorting:
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.☆20Mar 13, 2024Updated last year
- FACT is a tool to collect, process and visualise forensic data from clusters of machines running in the cloud or on-premise.☆17Aug 30, 2024Updated last year
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year
- Mininode is a CLI tool to reduce the attack surface of the Node.js applications by using static analysis.☆21Apr 11, 2023Updated 2 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- ☆46Mar 20, 2021Updated 4 years ago
- Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.☆19Feb 11, 2026Updated 3 weeks ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- Cross-Site Scripting (XSS) vulnerability analyzer☆21Feb 13, 2026Updated 3 weeks ago
- Ansible playbooks that will without any user interaction provision Check Point Security Management server (SM) or Multi-Domain Management…☆11Jan 28, 2022Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- This is the official repository for the back end of Mobilinux App.☆21Oct 1, 2023Updated 2 years ago
- Swagger Directory Enumeration (SDE)☆21Jan 16, 2021Updated 5 years ago
- ☆100Nov 10, 2021Updated 4 years ago
- ☆30Jul 28, 2024Updated last year
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Nov 3, 2020Updated 5 years ago
- ddos-checker is a tool used to perform a test on a website from a DDOS attack to find security gaps in a website.☆11Oct 16, 2025Updated 4 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 8 months ago
- Ideaslocas Repository☆37May 24, 2021Updated 4 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆73Dec 14, 2023Updated 2 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆71May 27, 2021Updated 4 years ago
- PDML importer for Burp Suite☆28Oct 20, 2020Updated 5 years ago
- Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a…☆32May 1, 2020Updated 5 years ago
- Advanced Vulnerability Scanner Tool☆69Jun 12, 2024Updated last year
- appieSniper is a python program to get notifications on overblijvers at nearby Albert Heijn supermarkets, this way you can claim you pack…☆11Jun 10, 2025Updated 8 months ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Nov 18, 2022Updated 3 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- sploit☆67Dec 21, 2019Updated 6 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated last month
- A TUI for Active Directory collection.☆112Feb 17, 2026Updated 2 weeks ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- .NET 4.0 Remote Desktop Manager Password Gatherer☆81Sep 29, 2020Updated 5 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- Data exfiltration and covert communication tool☆39Jan 10, 2023Updated 3 years ago