claroty / netunnelLinks
A tool to create network tunnels over HTTP/S written in Python 3
☆38Updated 3 months ago
Alternatives and similar repositories for netunnel
Users that are interested in netunnel are comparing it to the libraries listed below
Sorting:
- A modern code-injection framework for Python. Like Pyrasite but Kubernetes-aware.☆68Updated 5 months ago
- A thin async wrapper for SQLAlchemy sessions☆10Updated 4 years ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆51Updated 2 years ago
- The first open-source eBPF sandbox for Python (macOS/Linux): Secure libraries, block RCE, and enforce precise syscall control. Dive into …☆225Updated last week
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆73Updated 2 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆35Updated last week
- A JupyterLab extension to evaluate the security of your Jupyter environment☆39Updated 2 years ago
- ☆69Updated last week
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated 5 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Updated 8 months ago
- ☆60Updated 2 years ago
- ☆10Updated 3 years ago
- ☆23Updated last year
- ☆182Updated 6 months ago
- Modron - Cloud security compliance☆34Updated 10 months ago
- Fork Threat Modeling Platform - Community☆26Updated 3 weeks ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆56Updated last month
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated last year
- ☆94Updated 3 years ago
- Tool for reconnaissance of AWS cloud environments☆14Updated 2 years ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆32Updated 4 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- Simulates a compromise in a cloud and container environment☆32Updated 10 months ago
- This repository contains generated contextual data utilized by pyattck.☆19Updated 7 months ago
- ☆43Updated 4 years ago
- Scan your account for the use of untrusted AMIs☆30Updated 2 months ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Updated 11 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 5 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)☆41Updated last year