tilakthimmappa / pyraider
Using PyRaider You can scan installed dependencies known security vulnerabilities. It uses publicly known exploits, vulnerabilities database.
☆17Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for pyraider
- A small library to alter AWS API requests; Used for fuzzing research☆21Updated last year
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆43Updated 10 months ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆52Updated last year
- A meta-database collecting resources that compile lists of breaches☆18Updated last week
- A modern code-injection framework for Python. Like Pyrasite but Kubernetes-aware.☆58Updated last week
- Anti-Takeover is a sub domain monitoring tool for (blue/purple) team / internal security team which uses cloud flare. Currently Anti-Take…☆12Updated 4 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 2 years ago
- ☆14Updated last year
- ☆40Updated 4 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- Offensive Terraform Website☆44Updated 4 years ago
- A command-line whois - like client for the WHOIS and WHOIS History APIs by WhoisXML API Inc.☆17Updated 2 years ago
- Vulnerable Task Manager☆15Updated this week
- A walkthrough of security controls for a serverless architecture via a demo application☆11Updated 2 years ago
- Holds the public Hacking the Cloud CTFs.☆49Updated 8 months ago
- Tools to automate AWS Cloud security assessments☆23Updated 4 years ago
- OWASP ZAP addon for finding vulnerabilities in JWT Implementations☆30Updated 3 months ago
- A project to visualize the software supply chain☆35Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆40Updated last month
- ☆36Updated 6 months ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 3 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆62Updated 4 months ago
- find dangling domains in a multi cloud environment☆135Updated 6 months ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆43Updated 5 months ago
- A command-line application to generate random user agent strings.☆17Updated 4 years ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆39Updated 2 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆82Updated last month
- Yet Another SCA tool☆13Updated last year