deep file scanner tool
☆42Aug 13, 2025Updated 8 months ago
Alternatives and similar repositories for scnr
Users that are interested in scnr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆24Updated this week
- Security conferences talks☆25Jul 10, 2020Updated 5 years ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated 2 months ago
- ☆46Nov 7, 2024Updated last year
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A tool that allows downloading S3 directories as ZIP files☆34Apr 28, 2023Updated 3 years ago
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆37Jan 1, 2024Updated 2 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- ☆42Nov 20, 2023Updated 2 years ago
- ☆12Sep 12, 2021Updated 4 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- ☆30Jan 13, 2026Updated 3 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Terraform module to create a microservice for ML inference and general purpose☆14Jun 13, 2024Updated last year
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Updated this week
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Apr 27, 2026Updated last week
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆76Apr 4, 2026Updated last month
- ☆27Jul 2, 2020Updated 5 years ago
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 11 months ago
- (WIP) various language support for libpglite native☆22Aug 5, 2025Updated 9 months ago
- ☆51May 19, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Security tool against dependency typosquatting attacks☆56Apr 27, 2026Updated last week
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆47Aug 13, 2025Updated 8 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆143Jan 2, 2025Updated last year
- CLI frontend for com.apple.decmpfs / AppleFSCompression.framework☆34Oct 18, 2022Updated 3 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 9 years ago
- All the code from the book “Building User-Friendly DSLs” by Meinte Boersma for Manning Publications: https://www.manning.com/books/buildi…☆16Sep 25, 2024Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆229Apr 17, 2026Updated 3 weeks ago
- ☆36Oct 1, 2024Updated last year
- Fuzzy search and connect bluetooth devices via the terminal☆27Jan 27, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- When dlsym isn't enough☆20May 19, 2024Updated last year
- Tr1d1um is the Webpa micro-service that encode TR-181 requests.☆16Apr 29, 2026Updated last week
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆92May 7, 2024Updated 2 years ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆356Apr 21, 2026Updated 2 weeks ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- etcd-k8s-extract takes in an etcd data directory or db file used in kubernetes, extracts the kubernetes resources and then writes the res…☆39Jan 4, 2025Updated last year
- Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written …☆183Dec 21, 2025Updated 4 months ago