fish-not-phish / open-vbrowserLinks
vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark web analysis by cybersecurity professionals, it enables users to safely browse the internet—without exposing their identity or environment.
☆20Updated last month
Alternatives and similar repositories for open-vbrowser
Users that are interested in open-vbrowser are comparing it to the libraries listed below
Sorting:
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆57Updated 8 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆143Updated 8 months ago
- ☆50Updated 11 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆49Updated 2 months ago
- AWS honey token manager☆87Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- Generate datasets of cloud audit logs for common attacks☆219Updated last year
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated 10 months ago
- ☆73Updated last week
- A tool to uncover undocumented APIs from the AWS Console.☆114Updated 4 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Updated last year
- KYE: Know Your Enemies - Check external access on your AWS account☆126Updated 5 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆32Updated 11 months ago
- A full insecure kubernetes application for testing security tools☆89Updated 5 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆48Updated 4 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆93Updated last week
- Semgrep-based Policy Controller for Kubernetes☆47Updated 5 months ago
- A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP se…☆98Updated last week
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆40Updated last month
- Tool for obfuscating and deobfuscating data.☆72Updated last year
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated last year
- Open-source best practices for protecting a secure, sensible cloud platform☆127Updated 11 months ago
- ☆17Updated this week
- ☆44Updated last month
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆104Updated last year
- Google Maps for AWS IAM☆231Updated last week
- A tool for preventing the installation of malicious npm and PyPI packages☆162Updated this week
- ☆46Updated 10 months ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Updated last month