Validate the isolation posture of your container environment.
☆314Feb 11, 2026Updated last month
Alternatives and similar repositories for am-i-isolated
Users that are interested in am-i-isolated are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆86Feb 4, 2026Updated last month
- Security tool against dependency typosquatting attacks☆55Mar 17, 2026Updated last week
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆23Mar 16, 2026Updated last week
- AWS honey token manager☆90Aug 1, 2024Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- ☆192Apr 16, 2025Updated 11 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Mar 14, 2026Updated last week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- ☆18Feb 2, 2026Updated last month
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆79Sep 1, 2025Updated 6 months ago
- A fork of the Go language with some tweaks☆56Jan 29, 2025Updated last year
- krata is a Xen control plane in Rust.☆319Jul 3, 2025Updated 8 months ago
- #supply #chain #attack #detection☆646Updated this week
- A multi-vault secret injection tool for safely injecting secrets into app environment☆133Mar 2, 2026Updated 3 weeks ago
- Halberd : Multi-Cloud Agentic Attack Tool☆335Jan 12, 2026Updated 2 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 5 months ago
- ☆40Aug 2, 2024Updated last year
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 7 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆56Dec 18, 2023Updated 2 years ago
- ☆42Nov 13, 2025Updated 4 months ago
- ☆46Nov 7, 2024Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆62Jan 25, 2025Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- ☆30Jan 13, 2026Updated 2 months ago
- ☆43Jul 17, 2025Updated 8 months ago
- ☆14Jan 8, 2026Updated 2 months ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆174Jan 9, 2026Updated 2 months ago
- Awesome secure by default libraries to help you eliminate bug classes!☆701Dec 6, 2025Updated 3 months ago
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 9 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆235Feb 6, 2025Updated last year
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 11 months ago
- Tool for building Kubernetes attack paths☆951Updated this week
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆125Updated this week
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Scan GitHub Actions Workflow logs for IOCs☆16Mar 16, 2026Updated last week