nccgroup / whalescan
Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulnerable packages on the container
☆152Updated last year
Related projects ⓘ
Alternatives and complementary repositories for whalescan
- A Docker container for remote penetration testing.☆133Updated 3 years ago
- ☆133Updated last year
- Tool to discover external and internal network attack surface☆191Updated 5 months ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆133Updated 4 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆485Updated 2 months ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆74Updated 2 years ago
- ☆168Updated last year
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆109Updated 3 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 4 years ago
- Active Directory Lab for Penetration Testing☆49Updated 3 years ago
- Burp with Friends☆99Updated last year
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆216Updated 3 years ago
- ☆68Updated 3 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆68Updated 3 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Updated 3 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆219Updated 4 years ago
- Parse .nessus file(s) and shows output in interactive UI☆146Updated 6 months ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆141Updated last year
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆251Updated 2 years ago
- Identify IP addresses owned by public cloud providers☆112Updated 4 months ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆214Updated 3 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆93Updated 5 years ago
- A curated list of awesome BloodhoundAD resources☆226Updated 2 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆87Updated last year
- Mindmaps for threat hunting - work in progress.☆150Updated 2 years ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆280Updated last year
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆209Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 2 years ago
- Scripts and tools for AWS Pentest☆51Updated 4 years ago