☆43Jun 2, 2021Updated 4 years ago
Alternatives and similar repositories for red-bucket
Users that are interested in red-bucket are comparing it to the libraries listed below
Sorting:
- Lightspin AWS IAM Vulnerability Scanner☆94Mar 28, 2021Updated 4 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Nov 18, 2022Updated 3 years ago
- ☆10May 12, 2022Updated 3 years ago
- 根据关键字扫描github代码泄露☆11Oct 31, 2018Updated 7 years ago
- AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to…☆15May 14, 2024Updated last year
- Linux安全配置规范(包含文件权限列表sudo安全配置规范),Linux安全应用指导规范 还有对于iptables、Rootkit的研究☆18Sep 16, 2018Updated 7 years ago
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Jun 14, 2023Updated 2 years ago
- Security feed, done in the stupid simple way☆27Jan 8, 2025Updated last year
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- ZAP Management Scripts☆23Updated this week
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆20Jan 24, 2021Updated 5 years ago
- ☆22May 11, 2022Updated 3 years ago
- Darkbit Cloud Security Tools☆25Nov 12, 2020Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- Collect some PoC that I writted .记录自己写过的PoC ..☆22Dec 20, 2017Updated 8 years ago
- Repository for the OWASP DevSlop's Docker Game Day☆20Nov 15, 2023Updated 2 years ago
- 作为白帽子,手上有很多应急响应中心接受漏洞的范围和一些网站信息,为了便于管理,自己动手写了一个信息管理的平台,感兴趣的可以自己改改,制作自己的信息库☆56Dec 11, 2017Updated 8 years ago
- Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster☆36Jan 22, 2022Updated 4 years ago
- Some helpful Helm Charts for pentesters☆38Jan 28, 2019Updated 7 years ago
- ☆27Feb 19, 2026Updated 2 weeks ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆30Aug 6, 2014Updated 11 years ago
- S3 bucket enumerator☆30Apr 7, 2019Updated 6 years ago
- ☆27Aug 11, 2020Updated 5 years ago
- Stealthy Stand Alone PHP Web Shell☆33Sep 12, 2019Updated 6 years ago
- Repository for storing code for O'Reilly book☆34Feb 11, 2024Updated 2 years ago
- ☆46May 12, 2025Updated 9 months ago
- ☆83Jun 17, 2024Updated last year
- ☆28Jul 18, 2020Updated 5 years ago
- A simple Burp extension for scanning stuffs in CTF☆30Jan 22, 2018Updated 8 years ago
- This is a RSS feed collection for all the InfoSec Content Creators☆33Nov 2, 2023Updated 2 years ago
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.☆149Feb 15, 2026Updated 2 weeks ago
- Red Team K8S Adversary Emulation Based on kubectl☆826May 28, 2021Updated 4 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆49Dec 29, 2023Updated 2 years ago
- 🔑 WinPass11 WinService is a tool for loading keys into the registry on startup with the use of Windows Services.☆13Jun 29, 2021Updated 4 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- A phase-aware pharmacogenomic diplotyper for PacBio datasets☆20Dec 9, 2025Updated 2 months ago