Slack bot which promotes Defense in Depth/Zero Trust security practices
☆24Jan 17, 2023Updated 3 years ago
Alternatives and similar repositories for slackurity
Users that are interested in slackurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated last month
- ☆18Sep 13, 2021Updated 4 years ago
- The Jolly Executioner - a simple command execution proxy☆16Jun 9, 2024Updated last year
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Jan 24, 2023Updated 3 years ago
- Audit log wall of shame.☆42Aug 20, 2025Updated 7 months ago
- Bulk hostname lookup using shodan☆13Jun 1, 2022Updated 3 years ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆56Updated this week
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Sep 27, 2023Updated 2 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Nov 2, 2023Updated 2 years ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- Centralizing AWS CloudWatch log forwarding via EventBridge and Step Functions☆48Feb 12, 2023Updated 3 years ago
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Nov 18, 2024Updated last year
- Open-source firewall for AI agents. Policy engine that audits and controls what OpenClaw, Claude Code, Cursor, Codex, and any AI tool can…☆53Updated this week
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Sep 14, 2022Updated 3 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Apr 8, 2017Updated 8 years ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- Amazon EC2 Container Service Agent☆11Jan 16, 2025Updated last year
- An easy start with Intune☆11Aug 2, 2024Updated last year
- ☆20Jan 18, 2022Updated 4 years ago
- RFC8345-based Network Topology Modeling Toolbox☆20Feb 21, 2024Updated 2 years ago
- The mfrc522-python library is used to interact with RFID readers that use the MFRC522 chip interfaced with a Raspberry Pi.☆19Feb 14, 2026Updated last month
- Modron - Cloud security compliance☆34Dec 11, 2024Updated last year
- A Software as a Service (SaaS) log collection framework.☆184Mar 16, 2026Updated last week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Mar 17, 2026Updated last week
- A creation guide to running a web server on AWS in php☆12Jul 6, 2020Updated 5 years ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆170Jun 19, 2024Updated last year
- An osquery extension for endpoint engineers☆121Mar 16, 2026Updated last week
- A JavaScript API for the UniFi Controller built with Loopback☆12Oct 17, 2018Updated 7 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61May 15, 2023Updated 2 years ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Sep 11, 2024Updated last year
- ☆23Jul 30, 2018Updated 7 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Another aws example is a public app to help you to start with serverless application☆13Oct 3, 2024Updated last year
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Aug 9, 2019Updated 6 years ago
- An SMTP server sidecar to allow AWS SES usage with IAM roles☆15Feb 7, 2023Updated 3 years ago
- AWS managed IAM policies☆16Mar 24, 2022Updated 4 years ago
- Home repo for documentation and links to resources☆12Jul 25, 2019Updated 6 years ago