Service that scans your Infrastructure as Code for common vulnerabilities
☆49Dec 14, 2023Updated 2 years ago
Alternatives and similar repositories for iac-scan-runner
Users that are interested in iac-scan-runner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- ☆65Apr 28, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 3 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆60Apr 16, 2024Updated last year
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- ☆13Dec 21, 2023Updated 2 years ago
- PacketSpy☆157May 31, 2024Updated last year
- Web Path Finder☆60Nov 22, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- Unauthorized Docker Exploitation Tool☆37Dec 24, 2023Updated 2 years ago
- NoBlindi is a command-line tool for exploiting blind NoSQL injection vulnerabilities to recover passwords in web applications.☆28Nov 12, 2023Updated 2 years ago
- Secrets scanner that understands code☆168Dec 3, 2025Updated 3 months ago
- Easy way to run a LLVM instrumented kernel in qemu with gdb☆23Apr 19, 2024Updated last year
- ☆35Dec 6, 2023Updated 2 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆132Jun 1, 2024Updated last year
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆178Mar 1, 2026Updated 3 weeks ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Docker Remote API Scanner and Exploit☆179Nov 13, 2023Updated 2 years ago
- PassBreaker☆66Apr 5, 2024Updated last year
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆129Dec 23, 2025Updated 3 months ago
- Bypass 403 pages☆130Jun 30, 2024Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- ☆59Dec 15, 2023Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- NetProbe: Network Probe☆172Oct 13, 2024Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆61Nov 22, 2024Updated last year
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆26Nov 2, 2025Updated 4 months ago
- Mass bruteforce authentication of common services with common credentials.☆54Dec 2, 2023Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆229Feb 25, 2026Updated last month
- Reverse shell that can bypass windows defender detection☆171Feb 3, 2024Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago