Salesforce Policy Deviation Checker
☆30Sep 30, 2020Updated 5 years ago
Alternatives and similar repositories for SFPolDevChk
Users that are interested in SFPolDevChk are comparing it to the libraries listed below
Sorting:
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- ☆25Jun 27, 2024Updated last year
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- Like the unix tree command but for GCP Org Heirarchy☆27Apr 29, 2021Updated 4 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Container security resources☆10Nov 14, 2020Updated 5 years ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Mar 4, 2022Updated 3 years ago
- ☆74Sep 30, 2020Updated 5 years ago
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- ☆14Jan 8, 2026Updated last month
- Bro script module for detecting malware using domain generation algorithms.☆13Feb 22, 2018Updated 8 years ago
- The set of standards that Geomys maintainers strive to uphold in our professional activity as open source maintainers☆38Oct 23, 2025Updated 4 months ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆10Dec 6, 2017Updated 8 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- vulnerable single sign on☆150Aug 1, 2024Updated last year
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Jan 20, 2026Updated last month
- TSLint rules for Angular☆18Nov 30, 2018Updated 7 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆91Mar 17, 2025Updated 11 months ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Jan 9, 2022Updated 4 years ago
- ☆18Jul 30, 2024Updated last year
- ☆139Mar 29, 2023Updated 2 years ago
- A tool for identifying misconfigured CloudFront domains☆17Apr 27, 2018Updated 7 years ago
- Defensive S3 Bucket Squating☆31Jan 18, 2018Updated 8 years ago
- A Security Scanner for Go☆26Feb 11, 2019Updated 7 years ago
- Man in the middle for NLA enabled RDP in python☆15Nov 26, 2021Updated 4 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16May 5, 2016Updated 9 years ago
- ☆65Dec 9, 2021Updated 4 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆148Dec 3, 2020Updated 5 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Feb 10, 2026Updated 2 weeks ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Sep 19, 2023Updated 2 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago