fish-not-phish / open-vbrowserLinks
vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark web analysis by cybersecurity professionals, it enables users to safely browse the internet—without exposing their identity or environment.
☆20Updated 4 months ago
Alternatives and similar repositories for open-vbrowser
Users that are interested in open-vbrowser are comparing it to the libraries listed below
Sorting:
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆59Updated 11 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Updated last year
- ☆53Updated last year
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Updated 6 months ago
- Generate datasets of cloud audit logs for common attacks☆230Updated last year
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Updated last year
- ☆31Updated 3 weeks ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated last year
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Updated 2 years ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Updated 9 months ago
- AWS honey token manager☆89Updated last year
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆48Updated 2 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- KYE: Know Your Enemies - Check external access on your AWS account☆129Updated 8 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated last year
- ☆18Updated 3 weeks ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Updated last year
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Updated last month
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Updated last year
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆39Updated 4 months ago
- ☆75Updated 2 months ago
- ☆44Updated 4 months ago
- Google Maps for AWS IAM☆259Updated last week
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated 2 years ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Updated last year
- ☆101Updated 5 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆95Updated last week
- Generates runbooks for GuardDuty findings☆39Updated last year