efoncubierta / cloudspec
CloudSpec is an open source tool for validating your resources in your cloud providers using a logical language.
☆25Updated 3 years ago
Alternatives and similar repositories for cloudspec:
Users that are interested in cloudspec are comparing it to the libraries listed below
- Pivot into private VPC networks using a VPN connection☆41Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Updated 4 years ago
- Tools for auditing WAFS☆18Updated 2 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- Virtual Security Operations Center☆50Updated last year
- A collection of tools for managing and automating vulnerability management.☆13Updated 2 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 4 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Updated 6 years ago
- Restructured and Collaborated SIEM and CVSS Infrastructure. Presented at Blackhat Asia Arsenal 2020.☆3Updated 2 years ago
- AWS Security Tool☆29Updated last year
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 7 years ago
- A Developer and Security Engineer friendly package for Securing NodeJS Applications.☆26Updated 2 years ago
- A productivity burp extension which reminds to take break while you are at work!☆17Updated 4 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 3 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆37Updated 6 years ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Updated 5 years ago
- ☆14Updated last year
- ☆25Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 3 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 5 years ago