Lists (1)
Sort Name ascending (A-Z)
Stars
List of free GPTs that doesn't require plus subscription
Python3 terminal application that contains 405 Neo4j cyphers for BloodHound data sets and 388 GUI cyphers
A cloud native Identity & Access Proxy / API (IAP) and Access Control Decision API that authenticates, authorizes, and mutates incoming HTTP(s) requests. Inspired by the BeyondCorp / Zero Trust whi…
BeyondCorp-inspired HTTPS/SSO Access Proxy. Secure internal services outside your VPN/perimeter network during a zero-trust transition.
Open-source vulnerability disclosure and bug bounty program database
Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.
Kubernetes Security Training Platform - focusing on security mitigation
Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
A WSGI gateway for the AWS API Gateway/Lambda proxy integration
Security Analytics Engine - Anomaly Detection in Web Traffic
Scan your container images for package vulnerabilities with Aqua Security
Outline Server, developed by Jigsaw. The Outline Server is a proxy server that runs a Shadowsocks instance and provides a REST API for access key management.
Command line tool supporting migration from desk.com to Sales Force Service Cloud
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
Hands on labs and code to help you learn, measure, and build using architectural best practices.
Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.
Quick and dirty script to sanity check your password dumps against HaveIBeenPwned. Not Production ready but enough to sanity check.
A faster version of AFL-Fuzz used for DARPA Cyber Grand Challenge with optimized scheduler code
Attack and defend active directory using modern post exploitation adversary tradecraft activity