Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)
☆89Nov 18, 2022Updated 3 years ago
Alternatives and similar repositories for red-detector
Users that are interested in red-detector are comparing it to the libraries listed below
Sorting:
- Lightspin AWS IAM Vulnerability Scanner☆94Mar 28, 2021Updated 4 years ago
- ☆43Jun 2, 2021Updated 4 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆58Dec 11, 2024Updated last year
- Darkbit Cloud Security Tools☆25Nov 12, 2020Updated 5 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Dec 8, 2020Updated 5 years ago
- Red Team K8S Adversary Emulation Based on kubectl☆826May 28, 2021Updated 4 years ago
- Fun tools around the EBS Direct API☆19Apr 16, 2021Updated 4 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Dec 9, 2024Updated last year
- ☆55Apr 25, 2023Updated 2 years ago
- Carbon Black Response IR tool☆55Dec 10, 2020Updated 5 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- Cloud agnostic IAM permissions enumerator☆161Apr 10, 2025Updated 10 months ago
- Wicked sick v2.0 script is intended to automate your reconnaissance process in an organized fashion.☆149Mar 8, 2023Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆23Nov 22, 2021Updated 4 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- ☆10May 12, 2022Updated 3 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Examples of Docker image build pipelines, including vulnerability scanning with Anchore Engine☆10Mar 6, 2019Updated 6 years ago
- S3 Account Search☆36Jul 25, 2025Updated 7 months ago
- ☆30Jul 28, 2024Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- A PowerShell function that sends email messages using Azure SendGrid☆11Dec 8, 2022Updated 3 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- ☆13Jan 16, 2021Updated 5 years ago
- ☆16Jul 17, 2024Updated last year
- Red Team Coin for crypto-mining operations.☆23Jan 12, 2026Updated last month
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last week
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- Moved to HappyHackingSpace/pirebok☆14Feb 11, 2026Updated 2 weeks ago
- ☆53Oct 20, 2020Updated 5 years ago
- ☆27Feb 19, 2026Updated last week
- Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster☆36Jan 22, 2022Updated 4 years ago
- Collection of offensive tools targeting Microsoft Azure☆218Jan 18, 2023Updated 3 years ago
- ☆30Jan 30, 2021Updated 5 years ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆30Aug 6, 2014Updated 11 years ago