Dynamic Application Security Testing (DAST) for Cloud
☆44Nov 20, 2022Updated 3 years ago
Alternatives and similar repositories for probr-core
Users that are interested in probr-core are comparing it to the libraries listed below
Sorting:
- Kubernetes compliance validation pack for Probr☆19Jun 24, 2022Updated 3 years ago
- ☆14May 14, 2021Updated 4 years ago
- AKS compliance validation pack for Probr☆15Sep 9, 2021Updated 4 years ago
- Test Environment Booking tool☆14Nov 16, 2020Updated 5 years ago
- Wireless configuration tool☆17Jan 22, 2015Updated 11 years ago
- Cause sometimes you just need to dance ...☆10Oct 21, 2019Updated 6 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Jan 12, 2015Updated 11 years ago
- Privateer plugin for scanning the security hygiene of a GitHub repository.☆21Updated this week
- Repository for Delphix Terraform Provider built on DCT APIs.☆12Updated this week
- ORBIT: Open Resources for Baselines, Interoperability, and Tooling☆21Feb 28, 2026Updated 3 weeks ago
- Maltego with a twist of wireless☆26Jan 16, 2015Updated 11 years ago
- Evaluate source control (GitHub) security posture☆251Mar 8, 2023Updated 3 years ago
- Automatically removes Cloud managed services and Kubernetes resources based on tags with TTL☆227Updated this week
- Scrape CPAP data from the ResMed myAir website: https://myair.resmed.com/Default.aspx☆23May 22, 2023Updated 2 years ago
- demo of keyless signing with the sigstore kubernetes policy controller☆11Sep 7, 2022Updated 3 years ago
- Automation to apply AWS Compute Optimizer Recommendations to EC2 Instances☆10May 6, 2024Updated last year
- ASVS Level 1 and Level 2 cursor rules MDC☆29Mar 19, 2025Updated last year
- ☆25Jul 26, 2017Updated 8 years ago
- A program that does Deauthentication Attack on every nearby wireless device☆32Apr 8, 2019Updated 6 years ago
- PoC; terraform + kubeadm☆25Oct 2, 2016Updated 9 years ago
- Android clone☆11Jul 6, 2023Updated 2 years ago
- Facebook/Wit.ai bot for Ruby Hack Night☆10Jul 4, 2016Updated 9 years ago
- Minimizing rework for governance activities.☆46Updated this week
- ☆94Dec 15, 2023Updated 2 years ago
- ☆37Feb 20, 2024Updated 2 years ago
- User action detection toolkit. Spy on mobile phone apps using machine learning-based attacks on the encrypted traffic.☆11Sep 4, 2019Updated 6 years ago
- The way production should look.☆16Dec 31, 2013Updated 12 years ago
- Utility that converts SBOM documents from CycloneDX to SPDX☆33Jan 19, 2024Updated 2 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- a tool to audit the istio service mesh☆173Oct 22, 2021Updated 4 years ago
- right click any files or folders in the macOS Finder.app to edit the EXIF Date on photos and images☆19Jul 7, 2020Updated 5 years ago
- Tools Hack facebook , fitur : Bruteforce,Yahoo cloning,Bot ,Picture Guard .dll☆13Aug 2, 2019Updated 6 years ago
- A simple, yet flexible project generator for Go projects.☆10Feb 9, 2020Updated 6 years ago
- Example demonstrating how to create self-discovering Etcd clusters with Terraform☆11Jun 9, 2015Updated 10 years ago
- A Terraform module with a collection of common TLS certificate settings.☆12Sep 27, 2017Updated 8 years ago
- 802.11 monitor mode for Android without root.☆56Oct 24, 2012Updated 13 years ago
- ⬛ Windows Terminal + 🐧 WSL2 + zsh + Powerlevel10K☆13May 23, 2020Updated 5 years ago
- A worked example of integrating Prometheus monitoring with a Flask app☆11Aug 7, 2023Updated 2 years ago
- Tool to create friendly wrapping command lines over operations tools☆110Mar 7, 2026Updated 2 weeks ago