Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)
☆89Nov 18, 2022Updated 3 years ago
Alternatives and similar repositories for red-detector
Users that are interested in red-detector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Lightspin AWS IAM Vulnerability Scanner☆94Mar 28, 2021Updated 4 years ago
- ☆43Jun 2, 2021Updated 4 years ago
- ☆10May 12, 2022Updated 3 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Red Team K8S Adversary Emulation Based on kubectl☆826May 28, 2021Updated 4 years ago
- Darkbit Cloud Security Tools☆25Nov 12, 2020Updated 5 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆58Dec 11, 2024Updated last year
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Dec 8, 2020Updated 5 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Aug 8, 2022Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆23Nov 22, 2021Updated 4 years ago
- Fun tools around the EBS Direct API☆19Apr 16, 2021Updated 4 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- Cloud agnostic IAM permissions enumerator☆161Apr 10, 2025Updated 11 months ago
- S3 Account Search☆39Jul 25, 2025Updated 7 months ago
- ☆55Apr 25, 2023Updated 2 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- Wicked sick v2.0 script is intended to automate your reconnaissance process in an organized fashion.☆149Mar 3, 2026Updated 2 weeks ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Apr 14, 2023Updated 2 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Dec 9, 2024Updated last year
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- A library for patching ELFs☆62Dec 4, 2020Updated 5 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- ☆13Jan 16, 2021Updated 5 years ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- Signing-key abuse and update exploitation framework☆131May 18, 2025Updated 10 months ago
- #100DaysOfCloud #100DaysOfCyberSecurity snippets starting from 28 SEPT 2022☆15Oct 17, 2022Updated 3 years ago
- Open Cloud Security Posture Management Engine☆345Feb 19, 2022Updated 4 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- Moved to HappyHackingSpace/pirebok☆14Feb 11, 2026Updated last month
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- Collection of offensive tools targeting Microsoft Azure☆219Jan 18, 2023Updated 3 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- Python3 Websocket AND http proxy☆43Dec 18, 2022Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- ☆27Feb 19, 2026Updated last month
- A small library to alter AWS API requests; Used for fuzzing research☆22Nov 2, 2023Updated 2 years ago