MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.
☆177Mar 1, 2026Updated last week
Alternatives and similar repositories for metahub
Users that are interested in metahub are comparing it to the libraries listed below
Sorting:
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Whole-infrastructure automation tooling for AWS☆43Aug 22, 2025Updated 6 months ago
- Terraform module to Automatically suppress findings recorded by the AWS Security Hub service based on a pre-defined and configurable supp…☆19Updated this week
- PacketSpy☆156May 31, 2024Updated last year
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Feb 3, 2024Updated 2 years ago
- Docker Remote API Scanner and Exploit☆180Nov 13, 2023Updated 2 years ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆72Feb 2, 2024Updated 2 years ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆86Updated this week
- ☆317Mar 26, 2024Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Feb 22, 2026Updated 2 weeks ago
- Generate a matrix based on an inventory of InfoSec tools☆24Jul 4, 2024Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Mar 7, 2025Updated last year
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- Expand IAM Actions with Wildcards☆34Mar 2, 2026Updated last week
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆144May 17, 2024Updated last year
- hauditor is a tool designed to analyze the security headers returned by a web page.☆176Jul 6, 2024Updated last year
- ☆65Apr 28, 2024Updated last year
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆267Jan 26, 2023Updated 3 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated 11 months ago
- Some stuff for PHD2021☆14May 21, 2025Updated 9 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- A Secure Controls Framework (SCF) Power BI App☆26Nov 3, 2024Updated last year
- Python implementation of Stakeholder-Specific Vulnerability Categorization (SSVC)☆23Jan 21, 2026Updated last month
- ☆124May 26, 2025Updated 9 months ago
- Crowdsourced list of sensitive IAM Actions☆159Oct 29, 2024Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆229Feb 25, 2026Updated last week
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆79Updated this week
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆129Dec 23, 2025Updated 2 months ago
- ☆229Feb 24, 2026Updated last week
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- This project automates setup of Cost and Usage Reports (CUR) in a billing account with an Athena table enabling querying of the latest da…☆12Feb 27, 2026Updated last week
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆17Jan 21, 2026Updated last month
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆17Jan 23, 2025Updated last year
- ☆13Dec 21, 2023Updated 2 years ago
- List of known AWS accounts☆257Feb 6, 2026Updated last month
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83May 3, 2024Updated last year