xlab-si / iac-scan-runner
Service that scans your Infrastructure as Code for common vulnerabilities
☆46Updated 10 months ago
Related projects ⓘ
Alternatives and complementary repositories for iac-scan-runner
- ☆77Updated 7 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 3 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆47Updated 3 weeks ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆43Updated 8 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆62Updated 4 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆34Updated last month
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆33Updated 8 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆62Updated 9 months ago
- Mass bruteforce authentication of network protocols☆44Updated 11 months ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆28Updated last year
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆19Updated 2 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆47Updated 6 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- OSINT tool for username, email and domains☆19Updated 5 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 6 months ago
- Melee: Tool to Detect Infections in MySQL Instances☆21Updated last year
- Web Path Finder☆58Updated 11 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 3 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆37Updated last year
- Fast Path Traversal exploitation tool☆21Updated 6 months ago
- Top 400 passwords as per HaveIBeenPwned☆20Updated 3 weeks ago
- Check IP addresses against known cloud provider IP address ranges☆45Updated last year
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆18Updated 7 months ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated last year
- ☆29Updated last year
- ☆34Updated 8 months ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated 9 months ago
- ☆53Updated last month