xlab-si / iac-scan-runner
Service that scans your Infrastructure as Code for common vulnerabilities
☆46Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for iac-scan-runner
- ☆77Updated 7 months ago
- ☆34Updated 8 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 4 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆43Updated 8 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆37Updated last year
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆19Updated last week
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 6 months ago
- Basic protection against HTML smuggling attempts.☆43Updated this week
- Fast Path Traversal exploitation tool☆21Updated 7 months ago
- Melee: Tool to Detect Infections in MySQL Instances☆21Updated last year
- Web Path Finder☆59Updated last year
- Subdomains scanner Spider☆13Updated 8 months ago
- Challenge Python☆19Updated last year
- Top 400 passwords as per HaveIBeenPwned☆20Updated last month
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆11Updated 2 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆33Updated 8 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆47Updated last month
- ☆29Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆35Updated last month
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- ☆16Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆64Updated 5 months ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆28Updated last year
- ☆55Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆36Updated last month
- Tool for analyzing SAP Secure Network Communications (SNC).☆50Updated 7 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆62Updated 10 months ago