prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.
☆46Mar 22, 2026Updated this week
Alternatives and similar repositories for prel
Users that are interested in prel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Jul 30, 2024Updated last year
- CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versions…☆88Mar 20, 2026Updated last week
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- Multilingual library made for validation, various form fields, such as: email, telephone, password, cpf, cnpj, credit card, magic numbers…☆19Feb 15, 2025Updated last year
- CloudWatch Log Redirector☆15Feb 3, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆120Updated this week
- ☆16Jul 17, 2024Updated last year
- A recon tool for GCP Service Account Keys that requires no permissions☆27Apr 14, 2025Updated 11 months ago
- AWS honey token manager☆90Aug 1, 2024Updated last year
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- Scripts and IaC to create a ransomware resilient AWS Backup System☆16Sep 5, 2023Updated 2 years ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 10 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A simple touchID prompt'er for use in shell scripts.☆99Jun 18, 2024Updated last year
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆79Feb 7, 2026Updated last month
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆75Apr 14, 2025Updated 11 months ago
- JIT Groups is an open source application that lets you implement secure, self-service access management for Google Cloud using groups.☆287Mar 18, 2026Updated last week
- Docker Base Images (Centos/Alpine/Ubuntu)☆14Jan 18, 2019Updated 7 years ago
- ☆52Dec 20, 2025Updated 3 months ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Mar 19, 2026Updated last week
- An experimental AntiBot, AntiCrawl reverse proxy for serving simple static content.☆53Sep 29, 2024Updated last year
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆161Nov 21, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated last month
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Updated this week
- ☆40Aug 2, 2024Updated last year
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- ☆73May 13, 2025Updated 10 months ago
- Terraform module to set up alerts detecting manual actions using SNS. Monitors EKS Audit Logs and notifies subscribed operators when manu…☆11Jan 1, 2024Updated 2 years ago
- 📦 Produce secure packages and containers with declarative configurations☆285Mar 20, 2026Updated last week
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆290May 16, 2025Updated 10 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- ☆11Dec 19, 2024Updated last year
- ☆30Jan 13, 2026Updated 2 months ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 4 months ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 6 months ago