leaktk / patterns
Leak patterns for LeakTK tools to use
☆8Updated last week
Alternatives and similar repositories for patterns:
Users that are interested in patterns are comparing it to the libraries listed below
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 3 months ago
- Maturity Model Collaborative project☆14Updated 2 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated last month
- An open source Wireshark extcap to make ad hoc mirroring of AWS EC2 traffic easier☆19Updated 3 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆52Updated last year
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- ☆14Updated last year
- ☆58Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated 3 weeks ago
- ☆10Updated 2 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆49Updated 8 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- A fun POC that is built to understand AI security agents.☆25Updated 3 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆30Updated 5 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Updated 2 weeks ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆21Updated last year
- Modron - Cloud security compliance☆33Updated 3 months ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- Tool for obfuscating and deobfuscating data.☆69Updated last year
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆17Updated 3 years ago
- A project to visualize the software supply chain☆43Updated last year
- Do bulk whois lookups and get alerted on domains of interest.☆33Updated 7 months ago
- ☆45Updated 9 months ago
- A meta-database collecting resources that compile lists of breaches☆18Updated 4 months ago
- Adversary emulation for EDR/SIEM testing (macOS/Linux)☆40Updated last year
- Go module that returns supported regions for a service or supported services for a region☆15Updated 9 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 6 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆36Updated 6 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year