PercussiveElbow's starred repositories

grype

A vulnerability scanner for container images and filesystems

Language:GoLicense:Apache-2.0Stargazers:8247Issues:74Issues:807

osv-scanner

Vulnerability scanner written in Go which uses the data provided by https://osv.dev

Language:GoLicense:Apache-2.0Stargazers:6060Issues:59Issues:257

cosign

Code signing and transparency for containers and binaries

Language:GoLicense:Apache-2.0Stargazers:4275Issues:54Issues:955

artichoke

💎 Artichoke is a Ruby made with Rust

Language:RustLicense:MITStargazers:3021Issues:47Issues:377

Synology_HDD_db

Add your HDD, SSD and NVMe drives to your Synology's compatible drive database and a lot more

Language:ShellLicense:MITStargazers:2278Issues:41Issues:114

PCredz

This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.

Language:PythonLicense:GPL-3.0Stargazers:1933Issues:102Issues:31

slipstream

NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by anyone on the victim's network visiting a website

awesome-linux-rootkits

awesome-linux-rootkits

fapro

Fake Protocol Server

ScubaGear

Automation to assess the state of your M365 tenant against CISA's baselines

Language:Open Policy AgentLicense:CC0-1.0Stargazers:1487Issues:46Issues:858

SocksOverRDP

Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop

Language:C++License:MITStargazers:1043Issues:25Issues:14

hardeneks

Runs checks to see if an EKS cluster follows EKS Best Practices.

Language:PythonLicense:MIT-0Stargazers:828Issues:9Issues:22

aws-customer-security-incidents

A repository of breaches of AWS customers

aws-s3-virusscan

Antivirus for Amazon S3

Language:JavaLicense:Apache-2.0Stargazers:525Issues:21Issues:74

aws-recon

Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.

Language:RubyLicense:MITStargazers:516Issues:16Issues:77

MAMIP

[MAMIP] Monitor AWS Managed IAM Policies Changes

Language:PythonLicense:GPL-3.0Stargazers:455Issues:25Issues:7

Publications

A list of published research documents

quiet-riot

Unauthenticated enumeration of AWS, Azure, and GCP Principals

marionette

Selenium alternative for Crystal. Browser manipulation without the Java overhead.

Language:CrystalLicense:MITStargazers:181Issues:12Issues:18

guide-aws-hacking

This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS weaknesses you will be verse enough to provide the correct countermeasures.

routopsy

Routopsy - Hacking Routers with Routers

cloudkey

No need for IAM users when we have Yubikeys

road-to-secure-kubernetes

Hardening a sketchy containerized application one step at a time

Language:GoStargazers:53Issues:3Issues:0

security_incidents_from_caching

Collection of incidents resulting from caching issues

maxminddb.cr

MaxMind DB Reader for Crystal

Language:CrystalLicense:MITStargazers:23Issues:4Issues:10

BuildReview-Windows

A PowerShell script for performing a build review of a Windows host

Language:PowerShellLicense:GPL-3.0Stargazers:23Issues:2Issues:1

dns.cr

🚧 Under evaluation - Crystal Domain Name System Resolver

Language:CrystalLicense:BSD-3-Clause-ClearStargazers:14Issues:2Issues:2

phishing-training-sigs

A crowd sourced list of phishing training simulators and their signatures

sslscan.cr

Crystal shard wrapping the rbsec/sslscan utility

Language:CrystalLicense:MITStargazers:10Issues:17Issues:2