☆22Jul 24, 2025Updated 7 months ago
Alternatives and similar repositories for Cloud-Native-Security-Talks
Users that are interested in Cloud-Native-Security-Talks are comparing it to the libraries listed below
Sorting:
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆44Updated this week
- Ran is an experimental offensive tool for Kubernetes clusters with the goal to enable quick emulation of adversary techniques and a colle…☆30Updated this week
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Collection of incidents resulting from caching issues☆29Jun 3, 2025Updated 9 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Jan 28, 2024Updated 2 years ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆112Jan 2, 2025Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 5 months ago
- Intent driven security automation framework☆27Aug 12, 2025Updated 6 months ago
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- ☆30Jan 12, 2023Updated 3 years ago
- A collection of prompt injection mitigation techniques.☆27Aug 19, 2023Updated 2 years ago
- Jumpstart multiple WebSocket servers quickly☆32Nov 23, 2021Updated 4 years ago
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆32Aug 29, 2023Updated 2 years ago
- This tool have the power to hide any PID/directory in the Linux kernel☆30Sep 13, 2024Updated last year
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆140Feb 28, 2023Updated 3 years ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- Automatic multiprocess Linux CLI tool that aims for a quick enumeration wrapping pentesting tools.☆13Feb 22, 2026Updated last week
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated 3 weeks ago
- ☆40Nov 29, 2024Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated 11 months ago
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 9 months ago
- A penetration toolkit for container environment☆123Feb 14, 2026Updated 2 weeks ago
- Terraform code and Sentinel policies for HashiConf-2019 talk/demo☆10Sep 23, 2019Updated 6 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago
- ☆10May 12, 2022Updated 3 years ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Unofficial AppImage of mpv [Maintainer=@Samueru-sama]☆11Updated this week
- This repository will run the self-hosted github actions runners for Windows with Visual Studio 2022 buildtools installed by default.☆12Sep 6, 2024Updated last year
- Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.☆11Apr 27, 2023Updated 2 years ago
- Cross cloud workload identity research and workshops☆49Updated this week
- A custom transfer agent for git-lfs that uses rclone to transfer files.☆12Jan 14, 2025Updated last year
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- A minimalistic popup calendar☆10Jul 30, 2023Updated 2 years ago
- Stripped down versions of several archlinux packages, former name llvm-libs-debloated. [Maintainer=@Samueru-sama]☆14Updated this week
- ☆14Feb 13, 2025Updated last year