chen-keinan / mesh-kridik
mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and is leveraged by OPA (Open Policy Agent) to enforce security rules.
☆26Updated last month
Alternatives and similar repositories for mesh-kridik:
Users that are interested in mesh-kridik are comparing it to the libraries listed below
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Exactly what it sounds like, which is something rad☆20Updated 2 years ago
- Active Directory Password Spray Testing Utility in Go☆14Updated 10 months ago
- Tool for reconnaissance of AWS cloud environments☆13Updated last year
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆16Updated last week
- Ansible Cobalt Strike (Docker)☆15Updated 3 years ago
- Kibana app for RedELK☆16Updated last year
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆14Updated last year
- Standardizing Security Titles☆13Updated 2 years ago
- ☆12Updated 2 months ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- ☆12Updated last year
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- ☆14Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 3 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- A Canary which fires when uninstalled☆34Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- Exploit for win10 SMB3.1☆17Updated 4 years ago
- python3 scripts to help with aws triage needs☆15Updated 2 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Docker container for running OWASP WebGoat.NET application☆11Updated 6 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Updated 4 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 4 years ago
- Citrix ADC (NetScaler) Honeypot. Supports detection for CVE-2019-19781 and login attempts☆26Updated 5 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year