Casting light on shadow cloud deployments. Detect exposure of resources deployed in AWS.
☆27Jan 19, 2026Updated 2 months ago
Alternatives and similar repositories for luminaut
Users that are interested in luminaut are comparing it to the libraries listed below
Sorting:
- llama is lightgrep's amazing media analyzer☆16Oct 28, 2025Updated 4 months ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Jun 6, 2016Updated 9 years ago
- A ruleset to find potentially malicious code in macOS malware samples☆41Aug 29, 2023Updated 2 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- Parquet extension☆11Mar 3, 2026Updated 2 weeks ago
- A set of Jupyter Lab Notebooks and Other Implementations of Community Reports in Standard Form☆18Apr 15, 2024Updated last year
- A place to document various design decisions for public reference☆11Sep 28, 2022Updated 3 years ago
- Generating ebooks in MOBI end EPUB formats from articles you saved on Pocket account or which showed up in your favourite RSS feeds.☆12Nov 25, 2021Updated 4 years ago
- Notes for High Availability MISP in AWS☆19Nov 6, 2019Updated 6 years ago
- Pre-processing DBpedia datasets to load into Dgraph☆13Mar 6, 2022Updated 4 years ago
- Open Source Maturity Model☆16Apr 30, 2024Updated last year
- Golang Library to interact with your MISP instance☆22Sep 12, 2019Updated 6 years ago
- CDPO is a tool to validate, de-duplicate, combine, query, and encrypt track data recovered from a breach.☆15Jun 23, 2017Updated 8 years ago
- The Hitchhiker's Guide to Documentation!☆22Apr 25, 2015Updated 10 years ago
- Red Team Ethics, resources and more☆17Feb 9, 2020Updated 6 years ago
- Dont Gamble with Risk☆14Mar 4, 2024Updated 2 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- A powerful proxy checker that checks and evaluates proxies for speed, availability, and anonymity across multiple protocols (HTTP, HTTPS,…☆12Oct 31, 2025Updated 4 months ago
- PostMaster is a beautiful web application to manage domains, users, and aliases on a Linux mail server☆18May 21, 2018Updated 7 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Tools and scripts to deploy and manage OpenRelik instances☆16Mar 3, 2026Updated 2 weeks ago
- ☆14Feb 2, 2021Updated 5 years ago
- A highly customizable homepage (or startpage / application dashboard) with Docker and service API integrations.☆10May 25, 2025Updated 9 months ago
- An Alexa custom skill to control your MyQ-Enabled devices☆10May 7, 2019Updated 6 years ago
- The Jolly Executioner - a simple command execution proxy☆16Jun 9, 2024Updated last year
- A set of tools for collecting forensic information☆27Apr 4, 2020Updated 5 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆23Oct 31, 2018Updated 7 years ago
- Config files for my GitHub profile.☆27Apr 25, 2025Updated 10 months ago
- Recover EXT filesystem info from carved directory blocks☆19Jun 23, 2017Updated 8 years ago
- ☆23Oct 26, 2021Updated 4 years ago
- Is your AWS tagging strategy following best practice? This mod checks if your AWS resource tags are set correctly to help you manage them…☆19Sep 8, 2025Updated 6 months ago
- Scripts and IaC to create a ransomware resilient AWS Backup System☆16Sep 5, 2023Updated 2 years ago
- Workflow Automation Platform☆12Mar 2, 2026Updated 2 weeks ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆149Nov 14, 2025Updated 4 months ago
- Content Security Policy Creation tools☆35Aug 3, 2015Updated 10 years ago
- Repo hacks☆21Dec 7, 2025Updated 3 months ago
- How I take care of my personal dotfiles☆12Feb 26, 2022Updated 4 years ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Mar 1, 2024Updated 2 years ago