mercari / gcp-sa-key-checkerView external linksLinks
A recon tool for GCP Service Account Keys that requires no permissions
☆26Apr 14, 2025Updated 10 months ago
Alternatives and similar repositories for gcp-sa-key-checker
Users that are interested in gcp-sa-key-checker are comparing it to the libraries listed below
Sorting:
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 2 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Data Backend server that uses eBPF to monitor network connections and provide real-time network analytics.☆18Aug 14, 2025Updated 6 months ago
- Dataset fingerprinting for AIBOM☆15Updated this week
- ☆36Apr 29, 2025Updated 9 months ago
- Leverage Ollion's GCP Landing Zone to deploy a secure, compliant foundation with ease. The repository contains an implementation of a sec…☆38Jun 13, 2024Updated last year
- Static Regexp code generation in pure Go☆19Feb 5, 2025Updated last year
- ☆18Feb 2, 2026Updated 2 weeks ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Jan 28, 2021Updated 5 years ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 10 months ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆45Updated this week
- Collection of all previous 1337UP CTF challenges.☆79Jan 6, 2025Updated last year
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆30Nov 26, 2025Updated 2 months ago
- Security Alert Decoration☆27Jul 21, 2025Updated 6 months ago
- Community contributed tools☆23Oct 27, 2025Updated 3 months ago
- BPFView: Process and Network Activity Correlation☆34May 17, 2025Updated 9 months ago
- Go utility library for convenient looping using Go's range-over-func feature☆26Jun 15, 2025Updated 8 months ago
- Create honeypots for cloud environments☆110Oct 6, 2025Updated 4 months ago
- MLOps Attack Toolkit☆29Aug 25, 2025Updated 5 months ago
- ☆29Dec 26, 2025Updated last month
- ☆43Aug 27, 2025Updated 5 months ago
- ☆24Jan 26, 2021Updated 5 years ago
- nodejsscan Github Action☆28Nov 11, 2024Updated last year
- KYE: Know Your Enemies - Check external access on your AWS account☆129Apr 25, 2025Updated 9 months ago
- ☆31Oct 28, 2024Updated last year
- Some helpful Helm Charts for pentesters☆38Jan 28, 2019Updated 7 years ago
- A utility for parsing Common and Combined Log Format (CLF) log files.☆32Mar 29, 2025Updated 10 months ago
- ☆30Sep 1, 2022Updated 3 years ago
- ☆34Feb 10, 2023Updated 3 years ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆101Jan 6, 2026Updated last month
- Scan your account for the use of untrusted AMIs☆31Updated this week
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆167Dec 7, 2025Updated 2 months ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆44Dec 31, 2024Updated last year
- ☆41Nov 29, 2024Updated last year
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- MCP server: using eBPF to tracing your kernel☆64Aug 1, 2025Updated 6 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 7 months ago
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 9 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Feb 2, 2026Updated 2 weeks ago