☆28Jun 12, 2025Updated 9 months ago
Alternatives and similar repositories for gadjit
Users that are interested in gadjit are comparing it to the libraries listed below
Sorting:
- Identity governance for any SaaS, infrastructure, or tool☆95Updated this week
- RPM spec file for sas2ircu: LSI Corporation SAS2 IR (Integrated RAID) Configuration Utility☆21Sep 5, 2023Updated 2 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- ☆16Feb 3, 2026Updated last month
- ☆12Oct 22, 2020Updated 5 years ago
- Overview of philips-labs helm charts☆17Mar 10, 2026Updated last week
- verify https assets with a public transparency log☆75Oct 28, 2021Updated 4 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- A whisper file writer written in Go☆25Jul 16, 2017Updated 8 years ago
- A demo project that implements HashiCorp Vault on Google Clould Platform / CoreOS cluster, managed by Terraform☆25Jun 29, 2016Updated 9 years ago
- Scripts to quickly fix security and compliance issues☆28Mar 10, 2026Updated last week
- A warrant canary system☆30May 18, 2018Updated 7 years ago
- Shell scripts☆13Nov 10, 2020Updated 5 years ago
- ☆24Apr 11, 2012Updated 13 years ago
- ip6.arpa scanner☆33Dec 19, 2016Updated 9 years ago
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆73Jan 31, 2026Updated last month
- A Go program to display certificate chains simply and quickly with an easy to remember syntax☆28Oct 28, 2024Updated last year
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 6 months ago
- IPv6 network walking utilities (ip6dnswalk, ip6dnshide)☆22May 27, 2014Updated 11 years ago
- ☆31Jan 4, 2024Updated 2 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Aug 13, 2015Updated 10 years ago
- Some fun programs and snippets I wrote☆15Mar 29, 2017Updated 8 years ago
- My dotfiles☆19Dec 18, 2024Updated last year
- Logging/Metrics Daemon: Logstash Formatted write to Elasticsearch with Fluentd, Kafka, Monit inputs and Graphite, Elasticsearch outputs☆81Feb 13, 2018Updated 8 years ago
- Some scripts I've written, modified, or stolen for doing various things.☆16Dec 1, 2024Updated last year
- Doom fire effect, implemented in WebAssembly☆21May 30, 2019Updated 6 years ago
- ☆46Nov 7, 2024Updated last year
- Kiibohd Controller☆15Jan 17, 2017Updated 9 years ago
- in-memory fuzzing with gdb☆21Feb 10, 2016Updated 10 years ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 7 months ago
- Power tool for shredding text in Insert mode☆17Feb 13, 2022Updated 4 years ago
- Container Hardening Priorities Specification (CHPS)☆45Mar 31, 2025Updated 11 months ago
- hand-picked colors for iTerm2, in light & dark variations☆20Apr 26, 2015Updated 10 years ago
- ☆34Aug 5, 2015Updated 10 years ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 8 months ago
- ☆36Apr 29, 2025Updated 10 months ago
- ☆15Aug 12, 2022Updated 3 years ago
- CrunchyCrypt - Safe and Simple Cryptography☆126Aug 25, 2019Updated 6 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆25Sep 27, 2022Updated 3 years ago