slingamn / vault-exfiltrateLinks
proof-of-concept for recovering the master key from a Hashicorp Vault process
☆69Updated 2 years ago
Alternatives and similar repositories for vault-exfiltrate
Users that are interested in vault-exfiltrate are comparing it to the libraries listed below
Sorting:
- A tool for getting SSH keys out of LDAP☆49Updated 3 years ago
- The Container Security Book—a free book for practitioners☆82Updated 5 years ago
- API that leverages Clair to scan Docker Registries and Kubernetes Clusters for vulnerabilities☆151Updated 2 years ago
- "Transit like" secret backend plugin for PGP/GPG in Hashicorp Vault☆92Updated 3 weeks ago
- Generate seccomp profiles from go binaries☆135Updated 7 years ago
- An easy way to give all your EC2 instances SSH host certificates☆16Updated 2 years ago
- Rips code blocks from markdown.☆34Updated 6 months ago
- An actuary is a business professional who analyzes the financial consequences of risk.☆81Updated 8 years ago
- ☆56Updated 8 years ago
- Container Snitch checks running processes under the Docker Engine and alerts if any are found to be running as root☆77Updated 8 years ago
- A Dockerfile that creates an image with known vulnerabilities.☆50Updated 3 years ago
- AWS Metadata Proxy for protection against SSRF☆68Updated 5 years ago
- A package for handling ssh certificates☆45Updated 3 years ago
- DNSmetrics connects to your accounts at multiple managed DNS providers using their APIs and emits standardized metrics in statsd format f…☆14Updated 6 years ago
- Hallow is a SSH Certificate Authority designed for use with AWS native environments☆65Updated last year
- An example @HashiCorp Vault token helper for Mac OS X Keychain.☆65Updated 3 years ago
- Use Manifesto to store and query metadata for container images.☆164Updated 6 years ago
- Go client to negotiate SSH certificates☆64Updated last week
- ☆34Updated 6 years ago
- This SDK allows developers to extend Sentinel to source external information for use in their policies.☆54Updated this week
- A tool to pass Vault secrets to other processes via environment variables.☆33Updated 6 years ago
- CLI tool for CIDR range operations (check, generate)☆138Updated 5 years ago
- A forward proxy for machines, with access control lists☆16Updated 2 years ago
- PAL: A secret bootstrapping tool for Docker☆84Updated last year
- A non-interactive daemon for host management☆117Updated this week
- An AWS cross-account tool to support human access with MFA for the CLI and GUI.☆19Updated 7 years ago
- Simplifying Seccomp enforcement in containerized or non-containerized apps☆112Updated 5 years ago
- A proxy for docker.sock that enforces access control and isolated privileges☆144Updated 4 years ago
- ☆99Updated 2 months ago
- Send information about on-call users to other services like GitLab, LDAP, or Slack☆54Updated 7 months ago