Slack bot which promotes Defense in Depth/Zero Trust security practices
☆24Jan 17, 2023Updated 3 years ago
Alternatives and similar repositories for slackurity
Users that are interested in slackurity are comparing it to the libraries listed below
Sorting:
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated 2 weeks ago
- Bulk hostname lookup using shodan☆14Jun 1, 2022Updated 3 years ago
- The Jolly Executioner - a simple command execution proxy☆16Jun 9, 2024Updated last year
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Jan 24, 2023Updated 3 years ago
- Audit log wall of shame.☆42Aug 20, 2025Updated 6 months ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Nov 2, 2023Updated 2 years ago
- ☆18Sep 13, 2021Updated 4 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- ☆20Jan 18, 2022Updated 4 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Sep 27, 2023Updated 2 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61May 15, 2023Updated 2 years ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Sep 14, 2022Updated 3 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Jan 4, 2026Updated 2 months ago
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 9 months ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- ☆32Feb 3, 2026Updated last month
- Modron - Cloud security compliance☆34Dec 11, 2024Updated last year
- CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versions…☆88Feb 25, 2026Updated last week
- ☆83Dec 5, 2019Updated 6 years ago
- Xipher is a curated collection of cryptographic primitives put together to perform key/password based asymmetric encryption☆14Feb 21, 2026Updated last week
- AWS VPC Subnets Watcher☆79Aug 23, 2023Updated 2 years ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆170Jun 19, 2024Updated last year
- A Software as a Service (SaaS) log collection framework.☆182Jan 16, 2026Updated last month
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- Combine words from two wordlist files and concatenate them with an optional delimiter☆38Sep 25, 2023Updated 2 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- A prompt-based pipeline for finding, validating, and proving vulnerabilities using LLM sub-agents.☆41Feb 22, 2026Updated last week
- Create Timelapse or Livestream to youtube from Unifi G3 (flex) Camera☆12Mar 10, 2025Updated 11 months ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- Generate and Permutate Context Aware Dictionaries for Application Testing☆11Aug 16, 2016Updated 9 years ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆42Jan 9, 2023Updated 3 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- AppMap client agent for Python☆104Feb 4, 2026Updated last month
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆107Jan 30, 2025Updated last year
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- orgleaks is a tool to run gitleaks for an organization.☆11Oct 19, 2021Updated 4 years ago