Lists (2)
Sort Name ascending (A-Z)
Stars
A phone number can reveal whether a device is active, in standby or offline (and more). This PoC demonstrates how delivery receipts + RTT timing leak sensitive device-activity patterns. (WhatsApp /…
Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud environment.
Hurl, run and test HTTP requests with plain text.
Small Python library for querying stock information from Nasdaq Nordic's API. Finnish, Swedish, Norwegian and Danish markets.
Financial data platform for analysts, quants and AI agents.
Small and highly portable detection tests based on MITRE's ATT&CK.
Container image with network tools for troubleshooting Kubernetes clusters
This tool analyzes a given Github repository and searches for dangling or force-pushed commits containing potential secret or interesting information.
The repository of TrafficLLM, a universal LLM adaptation framework to learn robust traffic representation for all open-sourced LLM in real-world scenarios and enhance the generalization across dive…
GlazeWM is a tiling window manager for Windows inspired by i3wm.
Show who has RBAC permissions to perform actions on different resources in Kubernetes
Aspire is the tool for code-first, extensible, observable dev and deploy.
A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes
Execute ELF files without dropping them on disk
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH
Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.
PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.
This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting information.
Entropy is a CLI tool that will scan your codebase for high entropy lines, which are often secrets.
Opensource IDE For Exploring and Testing API's (lightweight alternative to Postman/Insomnia)
Fast persistent recoverable log and key-value store + cache, in C# and C++.
MetricFlow allows you to define, build, and maintain metrics in code.
Red Kite, the Extensible Attack Surface Management tool.