Like the unix tree command but for GCP Org Heirarchy
☆27Apr 29, 2021Updated 4 years ago
Alternatives and similar repositories for gcptree
Users that are interested in gcptree are comparing it to the libraries listed below
Sorting:
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 6 months ago
- Execute a shell command within Cloud Run☆31Jul 7, 2022Updated 3 years ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- Exports primitive and predefined GCP IAM Roles and their permissions☆109Mar 2, 2026Updated last week
- Censors or hides shell / Bash / console output based on defined patterns - great for hiding secrets in demos!☆41Apr 22, 2021Updated 4 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated last month
- This repo gives an overview of some GCP metadata API attack and defend patterns☆79Mar 23, 2020Updated 5 years ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- deep file scanner tool☆41Aug 13, 2025Updated 6 months ago
- Cookiecutter template for creating Ansible roles. Includes tests for TravisCI using Molecule.☆13Dec 14, 2021Updated 4 years ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- A terraform module to deploy Vault as per the reference architecture☆14Mar 19, 2019Updated 6 years ago
- Adv360 zmk config☆12Jan 11, 2026Updated last month
- A Binary Ninja plugin providing a set of BinaryViews for loading Motorola SREC, Intel HEX, and TI-TXT "hex" files☆10Sep 5, 2024Updated last year
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago
- ☆10May 12, 2022Updated 3 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- ☆48Sep 16, 2025Updated 5 months ago
- Crack passwords using Terraform and AWS☆43Mar 20, 2019Updated 6 years ago
- A Vue App for quickly generating KML Search Grids☆13Nov 12, 2024Updated last year
- PassKeeper is a Windows utility that allows you to keep an encrypted list of accounts with usernames, passwords, and notes.☆13Dec 29, 2011Updated 14 years ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated last month
- Docker Monitoring and Management Client☆26Feb 12, 2015Updated 11 years ago
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- ☆11Jul 15, 2024Updated last year
- CVE-2024-53691☆14Jan 13, 2025Updated last year
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Oct 20, 2022Updated 3 years ago
- Specialization in Python with flask towards Data Science☆11Oct 20, 2020Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- ogmigo is a go client for ogmios☆10Nov 22, 2023Updated 2 years ago
- These scripts provide a quick and easy way to create Bit Locker encrypted VHD (virtual hard disk) images using Batch or Power Shell. They…☆10Jan 7, 2021Updated 5 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.