google / acjs
☆10Updated last month
Alternatives and similar repositories for acjs:
Users that are interested in acjs are comparing it to the libraries listed below
- ☆11Updated last month
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆49Updated 3 years ago
- ☆36Updated last week
- egrets monitors egress☆46Updated 4 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated 10 months ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆22Updated 6 months ago
- Repository to archive GCP Documentation for local use☆13Updated 2 months ago
- ☆43Updated 9 months ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆34Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 4 months ago
- Kubernetes Unhinged Shell 😎☆45Updated 2 years ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆71Updated last year
- ☆74Updated last month
- ☆51Updated last month
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated last month
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- ☆12Updated 2 months ago
- An open source Wireshark extcap to make ad hoc mirroring of AWS EC2 traffic easier☆15Updated last month
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- An Evil OIDC Server☆51Updated 2 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆39Updated last year
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year
- ☆40Updated 7 months ago
- Modron - Cloud security compliance☆33Updated last month
- ☆33Updated last week
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆31Updated 7 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 4 months ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 3 years ago
- Tool for obfuscating and deobfuscating data.☆67Updated 10 months ago