slingamn / vault-exfiltrateLinks
proof-of-concept for recovering the master key from a Hashicorp Vault process
☆69Updated 2 years ago
Alternatives and similar repositories for vault-exfiltrate
Users that are interested in vault-exfiltrate are comparing it to the libraries listed below
Sorting:
- "Transit like" secret backend plugin for PGP/GPG in Hashicorp Vault☆93Updated 2 weeks ago
- The Container Security Book—a free book for practitioners☆83Updated 5 years ago
- A Dockerfile that creates an image with known vulnerabilities.☆49Updated 3 years ago
- A tool for getting SSH keys out of LDAP☆50Updated 3 years ago
- ☆56Updated 8 years ago
- API that leverages Clair to scan Docker Registries and Kubernetes Clusters for vulnerabilities☆151Updated 2 years ago
- Falco container runtime security extras (default rulesets and more)☆49Updated 6 years ago
- Generate seccomp profiles from go binaries☆135Updated 7 years ago
- An actuary is a business professional who analyzes the financial consequences of risk.☆81Updated 8 years ago
- A package for handling ssh certificates☆45Updated 4 years ago
- Simplifying Seccomp enforcement in containerized or non-containerized apps☆112Updated 5 years ago
- AWS Metadata Proxy for protection against SSRF☆68Updated 5 years ago
- A @HashiCorp Vault plugin for authenticating and receiving policies via Slack.☆50Updated 6 years ago
- CLI tool for CIDR range operations (check, generate)☆138Updated 5 years ago
- Hallow is a SSH Certificate Authority designed for use with AWS native environments☆65Updated last year
- ☆34Updated 6 years ago
- Exports primitive and predefined GCP IAM Roles and their permissions☆110Updated this week
- Use Manifesto to store and query metadata for container images.☆164Updated 7 years ago
- Container Snitch checks running processes under the Docker Engine and alerts if any are found to be running as root☆77Updated 8 years ago
- A static analysis tool for Terraform plans.☆44Updated 3 years ago
- GKE CIS 1.1.0 Benchmark InSpec Profile☆27Updated 4 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Updated 2 weeks ago
- An easy way to give all your EC2 instances SSH host certificates☆16Updated 2 years ago
- Rips code blocks from markdown.☆34Updated 8 months ago
- Kubernetes security scanner based on the open-source container vulnerability scanner Trivy.☆23Updated 5 years ago
- Autoupdate binaries with Docker Notary and TUF☆61Updated 5 years ago
- A proxy for docker.sock that enforces access control and isolated privileges☆144Updated 4 years ago
- A serverless SSH certificate authority to control access to machines using IAM and Lambda☆52Updated 7 years ago
- Go client to negotiate SSH certificates☆64Updated 2 weeks ago
- Bash wrapper script for Aquasec Microscanner☆61Updated 6 years ago