salesforce / lobster-potLinks
Scans every git push to your Github organisations to find unwanted secrets.
☆87Updated 4 months ago
Alternatives and similar repositories for lobster-pot
Users that are interested in lobster-pot are comparing it to the libraries listed below
Sorting:
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆105Updated 6 years ago
- sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.☆82Updated 4 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- A GitHub Action that creates a SBOM from your application so you can meet compliance and security requirements. Add this to your dev, sta…☆25Updated 2 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- Offensive Terraform Website☆45Updated 4 years ago
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 3 years ago
- Visualize your Terraform files☆34Updated 5 years ago
- Compares and analyzes GCP IAM roles.☆77Updated 6 months ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 6 years ago
- Protect against subdomain takeover☆93Updated 2 months ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆61Updated 4 years ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆48Updated 4 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Updated last year
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- A production-friendly malware scanner for your AWS cloud☆200Updated 4 years ago
- AWS SSO serverless phishing API.☆32Updated 4 years ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆64Updated 6 months ago
- AWS docs, guides, and other tools☆75Updated 2 years ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆110Updated 3 weeks ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated last year
- A meta-database collecting resources that compile lists of breaches☆20Updated 10 months ago
- Collection of incidents resulting from caching issues☆30Updated 3 months ago
- ☆113Updated 2 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆143Updated 4 months ago
- AWS STS token decoder☆42Updated 6 months ago
- Serverless honeytoken 🕵🏻♂️☆80Updated 2 years ago
- A toolset to juggle AWS roles for persistent access☆60Updated last year