Salesforce Policy Deviation Checker
☆30Sep 30, 2020Updated 5 years ago
Alternatives and similar repositories for SFPolDevChk
Users that are interested in SFPolDevChk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Salesforce object access auditor☆118Jan 30, 2023Updated 3 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- Like the unix tree command but for GCP Org Heirarchy☆27Apr 29, 2021Updated 4 years ago
- Bro script module for detecting malware using domain generation algorithms.☆13Feb 22, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 7 months ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- TSLint rules for Angular☆18Nov 30, 2018Updated 7 years ago
- A Security Scanner for Go☆26Feb 11, 2019Updated 7 years ago
- A python bot framework for slack☆21Mar 20, 2024Updated 2 years ago
- Defensive S3 Bucket Squating☆31Jan 18, 2018Updated 8 years ago
- ☆25Jun 27, 2024Updated last year
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Mar 4, 2022Updated 4 years ago
- Container security resources☆10Nov 14, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- The set of standards that Geomys maintainers strive to uphold in our professional activity as open source maintainers☆40Oct 23, 2025Updated 5 months ago
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆11Dec 6, 2017Updated 8 years ago
- ☆84Jun 2, 2021Updated 4 years ago
- vulnerable single sign on☆150Aug 1, 2024Updated last year
- ☆140Mar 29, 2023Updated 3 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Find cloud assets that no one wants exposed 🔎 ☁️☆348Jul 20, 2020Updated 5 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆285Nov 27, 2025Updated 4 months ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Updated this week
- Blazing CloudTrail since 2018☆138Jan 27, 2019Updated 7 years ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆278Sep 20, 2024Updated last year
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆109Nov 19, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- Tools to assess the DNS security of web applications☆127Oct 5, 2022Updated 3 years ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- ☆74Sep 30, 2020Updated 5 years ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆212Oct 31, 2024Updated last year
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Nov 30, 2018Updated 7 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated last year