pbnj / orthrus
🛡 Monitor, analyze, & report security misconfigurations across environments.
☆18Updated 7 years ago
Alternatives and similar repositories for orthrus:
Users that are interested in orthrus are comparing it to the libraries listed below
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- 🔓 Yet Another S3 Bucket Leak☆28Updated 6 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 8 years ago
- Lair Framework dockerized.☆38Updated 3 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 7 years ago
- A collection of scripts made duing my personal research☆28Updated 6 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Updated 7 years ago
- Scripts for AWS amusement...☆21Updated 2 years ago
- ☆13Updated 2 years ago
- ☆11Updated 7 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 7 years ago
- 🌌 Go-Observe: A command line Mozilla Observatory client written in Go☆12Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- ☆14Updated 7 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆18Updated 7 years ago
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 7 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 8 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago