webpwnized / gcp-auditView external linksLinks
GCP Audit checks projects in Google Cloud for compliance with CIS Benchmarks
☆29May 19, 2025Updated 8 months ago
Alternatives and similar repositories for gcp-audit
Users that are interested in gcp-audit are comparing it to the libraries listed below
Sorting:
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Extract CIS benchmarks from PDFs☆16Jul 26, 2023Updated 2 years ago
- Ansible playbooks that will without any user interaction provision Check Point Security Management server (SM) or Multi-Domain Management…☆11Jan 28, 2022Updated 4 years ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆39Dec 2, 2025Updated 2 months ago
- ☆36Oct 1, 2024Updated last year
- Evaluate and compare SBOMs of Maven projects☆13Mar 3, 2023Updated 2 years ago
- Vulnerabilities, exploits, and PoCs☆37Jan 16, 2026Updated 3 weeks ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆113Nov 19, 2024Updated last year
- 之前的个人wiki。现在用 Blog 的形式来写了。这个wiki就放在这里吧。希望里面的内容能帮助到别人。☆10Apr 2, 2020Updated 5 years ago
- ☆46Dec 30, 2018Updated 7 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆33Jan 27, 2026Updated 2 weeks ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Apr 26, 2025Updated 9 months ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆111May 19, 2022Updated 3 years ago
- Content Security Policy Generator, Powered by RapidSec☆16Feb 28, 2021Updated 4 years ago
- This script searches NVD's website for new CVES, alerting you by email or telegram. You can configure a list of products that interest yo…☆11Mar 21, 2021Updated 4 years ago
- go client for the wazuh rest api☆12Nov 1, 2025Updated 3 months ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 7 months ago
- Automate pwnage☆12Jul 17, 2018Updated 7 years ago
- idevicerestore, but with support for virtual devices☆11Jan 27, 2024Updated 2 years ago
- A plugin to generate Swift code for String Catalog (xcstrings), fonts, and other resources.☆10Jan 19, 2026Updated 3 weeks ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆16Nov 18, 2025Updated 2 months ago
- Check whether a Government of Canada domain is adhering to best security practices.☆12Feb 2, 2022Updated 4 years ago
- A purple team oriented cyber range deployed in AWS with Terraform☆12Jun 8, 2020Updated 5 years ago
- Sample terraform repo with multiple resources and a workflow that uses tools to automate cost management, security checks, best practices…☆10Jun 24, 2021Updated 4 years ago
- Website sources for the Apache Directory website☆10Nov 20, 2025Updated 2 months ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- Monitor collections of malicious Telegram bots used for phishing credential theft, to prevent frauds/dataleaks.☆14Jan 29, 2025Updated last year
- Flask(python)+ AngularJS application to control multiple vagrant machines on a headless server.☆17Apr 28, 2016Updated 9 years ago
- Microsoft Defender for Cloud attack simulation toolkit☆23Dec 24, 2024Updated last year
- Baseline, check and correct your SQL Database Security☆12Mar 9, 2022Updated 3 years ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Live coding in Reveal.js☆17Aug 9, 2016Updated 9 years ago
- ☆13Jul 9, 2024Updated last year
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago