Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container
☆106Nov 30, 2018Updated 7 years ago
Alternatives and similar repositories for ConMachi
Users that are interested in ConMachi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A container analysis and exploitation tool for pentesters and engineers.☆677Sep 27, 2023Updated 2 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Feb 10, 2026Updated last month
- Variety of kubectl krew tools usually security focused☆34Jul 17, 2025Updated 8 months ago
- Kubernetes Auto Analyzer☆191Dec 11, 2019Updated 6 years ago
- CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versions…☆88Updated this week
- Container introspection tool. Find out what container runtime is being used as well as features available.☆1,075Dec 9, 2020Updated 5 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆164Nov 28, 2025Updated 3 months ago
- Pentester-focused Docker registry tool to enumerate and pull images☆114Jan 27, 2020Updated 6 years ago
- The Container Security Book—a free book for practitioners☆82Mar 27, 2020Updated 5 years ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- Tool to check for applicable windows updates for a given machine in offline without dependency on WSUS or WUA.☆11Sep 23, 2020Updated 5 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Feb 16, 2021Updated 5 years ago
- ☆74Sep 30, 2020Updated 5 years ago
- Lightspin AWS IAM Vulnerability Scanner☆94Mar 28, 2021Updated 4 years ago
- AWS Lambda function interacting with AWS RDS Aurora cluster in VPC☆11Feb 21, 2017Updated 9 years ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- A simple Docker container that serves the MITRE ATT&CK Navigator web app☆27Apr 23, 2023Updated 2 years ago
- Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.☆103Dec 7, 2023Updated 2 years ago
- Bro script module for detecting malware using domain generation algorithms.☆13Feb 22, 2018Updated 8 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆36Oct 19, 2025Updated 5 months ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16May 5, 2016Updated 9 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- AppArmor and Seccomp profiles for Docker images☆14Dec 9, 2025Updated 3 months ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Sep 21, 2017Updated 8 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- dump Chrome cookies remotely with atexec and CDP☆69Aug 10, 2024Updated last year
- ☆11Dec 19, 2024Updated last year
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- ☆17Oct 26, 2018Updated 7 years ago
- Tool for auditing RBACs in Kubernetes☆224Feb 5, 2024Updated 2 years ago
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆75Apr 14, 2025Updated 11 months ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- ☆108Nov 15, 2025Updated 4 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- Validate the isolation posture of your container environment.☆314Feb 11, 2026Updated last month
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Nov 30, 2025Updated 3 months ago