fish-not-phish / open-vbrowserLinks
vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark web analysis by cybersecurity professionals, it enables users to safely browse the internet, without exposing their identity or environment.
☆20Updated last month
Alternatives and similar repositories for open-vbrowser
Users that are interested in open-vbrowser are comparing it to the libraries listed below
Sorting:
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆61Updated last year
- Generate datasets of cloud audit logs for common attacks☆232Updated this week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆141Updated last year
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Updated last year
- ☆52Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- A VS Code/Cursor extension capable of performing realtime security monitoring from inside the IDE☆74Updated this week
- AWS honey token manager☆89Updated last year
- An AWS IAM Privilege Escalation Path Library☆113Updated last week
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Updated 2 years ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Updated last year
- ☆76Updated 3 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆97Updated last week
- ☆29Updated last month
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆172Updated 3 weeks ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆49Updated 7 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated 2 years ago
- A full insecure kubernetes application for testing security tools☆90Updated 3 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- A tool to uncover undocumented APIs from the AWS Console.☆116Updated 9 months ago
- AWS Attack Path Scanner - Discover privilege escalation paths across 10+ AWS services☆137Updated 2 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Updated 2 years ago
- Semgrep-based Policy Controller for Kubernetes☆47Updated 10 months ago
- ☆46Updated last year
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆173Updated last year
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆102Updated 2 weeks ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆19Updated 2 years ago
- ☆192Updated 9 months ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆70Updated 2 months ago