proof-of-concept for recovering the master key from a Hashicorp Vault process
☆69Jun 9, 2023Updated 2 years ago
Alternatives and similar repositories for vault-exfiltrate
Users that are interested in vault-exfiltrate are comparing it to the libraries listed below
Sorting:
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- the working specification for a standard application registry☆18May 12, 2022Updated 3 years ago
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated 11 months ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- Collection of operational focused osquery dashboards.☆11Jan 20, 2021Updated 5 years ago
- A simple project to count Organisations, Workspaces and Runs.☆13Nov 27, 2023Updated 2 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- SEQ/Ack signature triggered SSL back connect☆10May 20, 2016Updated 9 years ago
- Native JACK support for Qubes OS (experimental)☆10Jul 22, 2017Updated 8 years ago
- Visualize your Terraform files☆34Sep 9, 2020Updated 5 years ago
- Notes from Scale Summit 2015☆27Mar 30, 2015Updated 10 years ago
- Because Clair needs a friend☆31May 6, 2019Updated 6 years ago
- Automate your Yum package mirrors with ease!☆88Nov 6, 2017Updated 8 years ago
- SELinux Policies for Vault☆37Feb 20, 2026Updated 2 weeks ago
- Consul DSH - Remote command execution on consul services☆17Oct 24, 2016Updated 9 years ago
- Dogscaler scales up AWS autoscale groups based on the results of a datadog query.☆16Feb 4, 2026Updated last month
- Go beyond package manager discovery for SBOM☆18Feb 22, 2022Updated 4 years ago
- Simple tool to refresh an MFA token for AWS IAM account (using STS)☆13Nov 19, 2019Updated 6 years ago
- A Benchmark for Container Orchestration Systems☆18Oct 2, 2017Updated 8 years ago
- Manage CloudFormation sanely with templates written in YAML☆42May 19, 2025Updated 9 months ago
- Create a dedicated IaaS instance per Pod to mitigate container breakout (including CPU vulnerabilities depending on the instance type)☆22Dec 11, 2019Updated 6 years ago
- Kubernetes Auto Analyzer☆191Dec 11, 2019Updated 6 years ago
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.☆57Oct 12, 2021Updated 4 years ago
- Man-in-the-middle TLS intercept proxy with tcpdumpable loopback☆21Apr 11, 2022Updated 3 years ago
- It records your terminal, then lets you upload to ASHIRT☆29Feb 27, 2026Updated last week
- See the upstream repository ->☆33Mar 7, 2018Updated 7 years ago
- Cascade data from production to staging with AWS RDS and Lambda☆21Nov 14, 2016Updated 9 years ago
- ☆24Nov 18, 2020Updated 5 years ago
- A Dockerfile that creates an image with known vulnerabilities.☆49Feb 9, 2022Updated 4 years ago
- A demonstration of a continuous integration pipeline focused on security testing☆31Oct 5, 2018Updated 7 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Use SQL to instantly query host, DNS and exploit information using Shodan. Open source CLI. No DB required.☆29Updated this week
- cloud native software supply chain ☁️🔗☆65Feb 15, 2021Updated 5 years ago
- Join meetings from the menubar.☆10Feb 15, 2021Updated 5 years ago
- <100 line IPVS load balancer written in BASH☆24Jan 24, 2016Updated 10 years ago
- Simplifying Seccomp enforcement in containerized or non-containerized apps☆112Oct 29, 2020Updated 5 years ago
- ☆29Jan 31, 2025Updated last year
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Dec 21, 2023Updated 2 years ago
- Hashcorp Vault provisoner☆30Mar 16, 2016Updated 9 years ago