☆76Oct 18, 2025Updated 4 months ago
Alternatives and similar repositories for go-ocsf
Users that are interested in go-ocsf are comparing it to the libraries listed below
Sorting:
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- ☆32Updated this week
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 7 months ago
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated last week
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 8 months ago
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 6 months ago
- A GitHub Actions Supply Chain CTF / Goat☆26Jan 6, 2026Updated 2 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 4 months ago
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆103Apr 23, 2024Updated last year
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆61Feb 5, 2025Updated last year
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 11 months ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 3 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Mar 1, 2026Updated last week
- A tool to check the security settings of Github Organizations.☆75Feb 9, 2026Updated last month
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 6 months ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆16Jan 25, 2026Updated last month
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆98Updated this week
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- A fork of the Go language with some tweaks☆56Jan 29, 2025Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆62Jan 25, 2025Updated last year
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Jul 21, 2025Updated 7 months ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated 11 months ago
- Open Source AWS Control Tower☆101Jan 3, 2025Updated last year
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆37Jan 1, 2024Updated 2 years ago
- A web CTF for training developers in bug hunting and secure coding!☆100Jan 12, 2025Updated last year
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 3 months ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆168Dec 7, 2025Updated 3 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆79Sep 1, 2025Updated 6 months ago
- Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact pro…☆518Updated this week
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆44Dec 31, 2024Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 2 months ago
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆41Feb 7, 2026Updated last month
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Validate the isolation posture of your container environment.☆313Feb 11, 2026Updated 3 weeks ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆173Jan 9, 2026Updated 2 months ago