google / acjsLinks
☆10Updated 6 months ago
Alternatives and similar repositories for acjs
Users that are interested in acjs are comparing it to the libraries listed below
Sorting:
- ☆11Updated 5 months ago
- ☆76Updated last week
- egrets monitors egress☆46Updated 5 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Updated 4 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 4 months ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆23Updated last month
- ☆40Updated 4 months ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆23Updated last year
- ☆16Updated 11 months ago
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆30Updated last week
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 9 months ago
- ☆16Updated 11 months ago
- ☆34Updated 2 months ago
- ☆31Updated 2 years ago
- Semgrep-based Policy Controller for Kubernetes☆47Updated 2 months ago
- ☆36Updated 10 months ago
- An open source Wireshark extcap to make ad hoc mirroring of AWS EC2 traffic easier☆19Updated 6 months ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆35Updated 2 years ago
- Kubernetes Unhinged Shell 😎☆46Updated 2 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 10 months ago
- ☆88Updated last month
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆56Updated 6 months ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆18Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- Collection of Semgrep rules for security analysis☆10Updated last year
- ☆12Updated last week
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 3 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated last year