slingamn / vault-exfiltrateView external linksLinks
proof-of-concept for recovering the master key from a Hashicorp Vault process
☆69Jun 9, 2023Updated 2 years ago
Alternatives and similar repositories for vault-exfiltrate
Users that are interested in vault-exfiltrate are comparing it to the libraries listed below
Sorting:
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- WSGI middleware collection to support special requirements☆14Nov 6, 2017Updated 8 years ago
- a module for a demostack configuration of bounday☆13Jan 17, 2024Updated 2 years ago
- A simple tool for bulk adding/updating/removing tags from AWS resources.☆13Jan 8, 2016Updated 10 years ago
- a security controller for Kubernetes☆14Feb 8, 2019Updated 7 years ago
- Corpus of crypto formats☆12Dec 2, 2022Updated 3 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 6 months ago
- SEQ/Ack signature triggered SSL back connect☆10May 20, 2016Updated 9 years ago
- Rule over hierarchical data!☆12Nov 25, 2017Updated 8 years ago
- Native JACK support for Qubes OS (experimental)☆10Jul 22, 2017Updated 8 years ago
- Visualize your Terraform files☆34Sep 9, 2020Updated 5 years ago
- Notes from Scale Summit 2015☆27Mar 30, 2015Updated 10 years ago
- Because Clair needs a friend☆31May 6, 2019Updated 6 years ago
- find historical account IDs for specified twitter @ name using wayback machine captures☆25Oct 15, 2021Updated 4 years ago
- SELinux Policies for Vault☆37Dec 9, 2025Updated 2 months ago
- IAM modules and YML-based terraform configuration generator☆18Nov 5, 2025Updated 3 months ago
- Consul DSH - Remote command execution on consul services☆17Oct 24, 2016Updated 9 years ago
- Secure extraction library for various archive and compression formats.☆25Updated this week
- Go beyond package manager discovery for SBOM☆18Feb 22, 2022Updated 3 years ago
- A distributed, serverless, configuration tool using AWS services☆74Oct 25, 2018Updated 7 years ago
- An experimental wrapper around etcd2 to add elastic discovery and join☆40May 24, 2016Updated 9 years ago
- A Benchmark for Container Orchestration Systems☆18Oct 2, 2017Updated 8 years ago
- An entropy and failure injection management API for Docker platforms.☆163Mar 24, 2020Updated 5 years ago
- Create a dedicated IaaS instance per Pod to mitigate container breakout (including CPU vulnerabilities depending on the instance type)☆22Dec 11, 2019Updated 6 years ago
- Kubernetes Auto Analyzer☆191Dec 11, 2019Updated 6 years ago
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.☆57Oct 12, 2021Updated 4 years ago
- Man-in-the-middle TLS intercept proxy with tcpdumpable loopback☆21Apr 11, 2022Updated 3 years ago
- See the upstream repository ->☆33Mar 7, 2018Updated 7 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Jun 21, 2025Updated 7 months ago
- It records your terminal, then lets you upload to ASHIRT☆29Feb 8, 2026Updated last week
- A Dockerfile that creates an image with known vulnerabilities.☆49Feb 9, 2022Updated 4 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- ☆25May 9, 2021Updated 4 years ago
- A demonstration of a continuous integration pipeline focused on security testing☆31Oct 5, 2018Updated 7 years ago
- Join meetings from the menubar.☆10Feb 15, 2021Updated 4 years ago
- Use SQL to instantly query host, DNS and exploit information using Shodan. Open source CLI. No DB required.☆29Updated this week
- <100 line IPVS load balancer written in BASH☆24Jan 24, 2016Updated 10 years ago
- Simplifying Seccomp enforcement in containerized or non-containerized apps☆112Oct 29, 2020Updated 5 years ago
- A template for writing a Nomad driver plugin.☆33Jan 5, 2026Updated last month