Salesforce Policy Deviation Checker
☆30Sep 30, 2020Updated 5 years ago
Alternatives and similar repositories for SFPolDevChk
Users that are interested in SFPolDevChk are comparing it to the libraries listed below
Sorting:
- Salesforce object access auditor☆118Jan 30, 2023Updated 3 years ago
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- Bro script module for detecting malware using domain generation algorithms.☆13Feb 22, 2018Updated 8 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16May 5, 2016Updated 9 years ago
- Github action for linting AWS IAM policy documents☆38Jan 20, 2023Updated 3 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- A Security Scanner for Go☆26Feb 11, 2019Updated 7 years ago
- A python bot framework for slack☆21Mar 20, 2024Updated 2 years ago
- Defensive S3 Bucket Squating☆31Jan 18, 2018Updated 8 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- A comprehensive framework for analyzing and defending against attacks targeting Software Development Life Cycle Infrastructure.☆133Mar 4, 2026Updated 2 weeks ago
- ☆25Jun 27, 2024Updated last year
- The set of standards that Geomys maintainers strive to uphold in our professional activity as open source maintainers☆39Oct 23, 2025Updated 4 months ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Mar 4, 2022Updated 4 years ago
- Container security resources☆10Nov 14, 2020Updated 5 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆10Dec 6, 2017Updated 8 years ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Mar 8, 2026Updated 2 weeks ago
- ☆84Jun 2, 2021Updated 4 years ago
- vulnerable single sign on☆149Aug 1, 2024Updated last year
- ☆139Mar 29, 2023Updated 2 years ago
- vcsmap is a plugin-based tool to scan public version control systems for sensitive information.☆141Aug 31, 2021Updated 4 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- Find cloud assets that no one wants exposed 🔎 ☁️☆347Jul 20, 2020Updated 5 years ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆284Nov 27, 2025Updated 3 months ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Collect chrome extensions from various devices and find out if they are malicious☆25Mar 1, 2026Updated 3 weeks ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Feb 10, 2026Updated last month
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- Blazing CloudTrail since 2018☆138Jan 27, 2019Updated 7 years ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆278Sep 20, 2024Updated last year
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆110Nov 19, 2020Updated 5 years ago
- Tools to assess the DNS security of web applications☆127Oct 5, 2022Updated 3 years ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- ☆74Sep 30, 2020Updated 5 years ago