claroty / netunnel
A tool to create network tunnels over HTTP/S written in Python 3
☆35Updated 2 months ago
Alternatives and similar repositories for netunnel:
Users that are interested in netunnel are comparing it to the libraries listed below
- A thin async wrapper for SQLAlchemy sessions☆10Updated 3 years ago
- A cloud first service for key to JWT authentication library and server written in Python 3☆19Updated 2 weeks ago
- Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)☆37Updated last year
- A JupyterLab extension to evaluate the security of your Jupyter environment☆39Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆49Updated 9 months ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆70Updated 2 years ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆53Updated 3 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated last year
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆51Updated 2 years ago
- Tool for obfuscating and deobfuscating data.☆70Updated last year
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 2 months ago
- ☆21Updated last month
- ☆39Updated 5 months ago
- Convert Sigma Rules to different formats☆11Updated 8 months ago
- This repository contains generated contextual data utilized by pyattck.☆19Updated last month
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 4 months ago
- ☆65Updated 4 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 6 months ago
- Scan your account for the use of untrusted AMIs☆20Updated 2 months ago
- An open source Wireshark extcap to make ad hoc mirroring of AWS EC2 traffic easier☆19Updated 4 months ago
- InSpec Profile to validate the secure configuration of aws-rds-infrastructure-cis-baseline, against CIS's Amazon Web Services Three-tier …☆14Updated 2 years ago
- ☆16Updated 9 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 7 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated last year
- Complete CNAPP Demo using Prisma Cloud☆16Updated 3 weeks ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆65Updated last week
- Security and compliance proxy for LLM APIs☆46Updated last year
- KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and files…☆38Updated 6 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆55Updated this week
- Efficient DevSecOps☆47Updated 4 months ago