GCP Audit checks projects in Google Cloud for compliance with CIS Benchmarks
☆29May 19, 2025Updated 9 months ago
Alternatives and similar repositories for gcp-audit
Users that are interested in gcp-audit are comparing it to the libraries listed below
Sorting:
- Extract CIS benchmarks from PDFs☆16Jul 26, 2023Updated 2 years ago
- Ansible playbooks that will without any user interaction provision Check Point Security Management server (SM) or Multi-Domain Management…☆11Jan 28, 2022Updated 4 years ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆40Dec 2, 2025Updated 3 months ago
- ☆42Nov 13, 2025Updated 3 months ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Mar 12, 2022Updated 3 years ago
- Evaluate and compare SBOMs of Maven projects☆13Mar 3, 2023Updated 3 years ago
- Security Workshop | Azure☆10Jul 28, 2020Updated 5 years ago
- Vulnerabilities, exploits, and PoCs☆37Jan 16, 2026Updated last month
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆113Nov 19, 2024Updated last year
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Apr 26, 2025Updated 10 months ago
- My home server infrastructure as code☆16Feb 28, 2026Updated last week
- ☆46Dec 30, 2018Updated 7 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- ☆10Dec 5, 2023Updated 2 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- 之前的个人wiki。现在用 Blog 的形式来写了。这个wiki就放在这里吧。希望里面的内容能帮助到别人。☆10Apr 2, 2020Updated 5 years ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- ll In One Tool For Info Gathering, SQL Vulnerability Scannig and Crawling☆13Jun 10, 2017Updated 8 years ago
- Check the risk score of an IP Address 🔎☆11May 16, 2024Updated last year
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆110May 19, 2022Updated 3 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- Check whether a Government of Canada domain is adhering to best security practices.☆12Feb 2, 2022Updated 4 years ago
- Sample terraform repo with multiple resources and a workflow that uses tools to automate cost management, security checks, best practices…☆10Jun 24, 2021Updated 4 years ago
- ☆14Jul 26, 2025Updated 7 months ago
- Sample code with security policies in Pulumi CrossGuard to implement preventive security checks in Infrastructure pipelines☆12Jan 4, 2023Updated 3 years ago
- Full archive of IndieWeb chat log data files☆16Updated this week
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- Microsoft Defender for Cloud attack simulation toolkit☆26Dec 24, 2024Updated last year
- SLA Buddy: a helpful robot to help you meet Service Level Agreement in Slack☆10Apr 5, 2024Updated last year
- ☆14Jan 18, 2020Updated 6 years ago
- Content Security Policy Generator, Powered by RapidSec☆16Feb 28, 2021Updated 5 years ago
- Checking for leaked passwords through haveibeenpwned v2 API using the hash-range checker☆12Feb 7, 2024Updated 2 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- PowerShell module to manage domain controllers & initial domain deployments☆13Oct 31, 2025Updated 4 months ago
- Azure Resource Graph example queries to build upon☆12Sep 20, 2019Updated 6 years ago