singe / jollyexec
The Jolly Executioner - a simple command execution proxy
☆16Updated 8 months ago
Alternatives and similar repositories for jollyexec:
Users that are interested in jollyexec are comparing it to the libraries listed below
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated 2 weeks ago
- ☆12Updated 3 months ago
- AWS STS token decoder☆37Updated 7 months ago
- ☆31Updated 3 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 6 months ago
- egrets monitors egress☆46Updated 4 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆72Updated 9 months ago
- ☆26Updated 3 months ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆16Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆30Updated 4 months ago
- Automated testing, generation & manipulation of #osquery packs☆72Updated 4 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆39Updated last year
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆60Updated 3 months ago
- A meta-database collecting resources that compile lists of breaches☆18Updated 4 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆60Updated last year
- ☆28Updated 4 months ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆19Updated last year
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆64Updated 2 weeks ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆61Updated last month
- ☆66Updated last month
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- Collection of incidents resulting from caching issues☆28Updated 2 weeks ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 5 months ago
- Semgrep-based Policy Controller for Kubernetes☆46Updated this week
- ☆32Updated 7 months ago
- Red team tool that emulates the SolarWinds CI compromise attack vector.☆22Updated 11 months ago
- boostsecurityio/lotp☆112Updated this week