crypto-br / SecBridgeLinks
☆13Updated last month
Alternatives and similar repositories for SecBridge
Users that are interested in SecBridge are comparing it to the libraries listed below
Sorting:
- AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to…☆14Updated last year
- If you are interested in a live feed API, please contact us☆15Updated 2 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆11Updated 2 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 7 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 8 months ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated 11 months ago
- OpenBAS Docker deployment helpers☆18Updated this week
- ☆37Updated 6 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated 11 months ago
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆55Updated 3 months ago
- Epyon is a swiss army knife tool for pentesting DevOps ecosystems.☆82Updated last year
- Helm chart for Open Cyber Threat Intelligence Platform☆20Updated last week
- AI-Powered Dark Web OSINT Tool☆72Updated last month
- ☆16Updated last month
- ☆36Updated 5 months ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆27Updated 2 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆50Updated 4 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated 6 months ago
- ☆15Updated 4 months ago
- Pentester-focused Docker registry tool to enumerate and pull images☆21Updated last month
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- A fun POC that is built to understand AI security agents.☆30Updated 5 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated 8 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆108Updated 6 months ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆19Updated last year
- Repo for experimenting and testing MCP server builds for CTI-related research.☆26Updated 3 weeks ago
- Sniffing out well-known threat groups☆28Updated 9 months ago
- Public repository of all things cloud security.☆41Updated 8 months ago
- Technical Tabletop Exercises Simulation Framework☆47Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 11 months ago