Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for misconfigurations
misconfigurations
x
15 search results found
Trivy
⭐
20,160
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Tfsec
⭐
6,573
Security scanner for your Terraform code
Popeye
⭐
4,827
👀 A Kubernetes cluster resource sanitizer
Sudo_killer
⭐
2,032
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
Trivy Operator
⭐
886
Kubernetes-native security toolkit
Windows Local Privilege Escalation Cookbook
⭐
710
Windows Local Privilege Escalation Cookbook
Stunner
⭐
690
Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers.
Chain Bench
⭐
674
An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchmark.
Lazytrivy
⭐
258
Vulnerability scanning just got lazier
Corsair_scan
⭐
116
Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).
Yotter
⭐
110
yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage
Vmclarity
⭐
77
VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities
Virtual Host
⭐
22
Modified Nuclei Templates Version to FUZZ Host Header
Tprox
⭐
16
TProx is a fast reverse proxy path traversal detector and directory bruteforcer.
Yatas Aws
⭐
13
Plugin for YATAS that audits AWS accounts for misconfiguration and security issues
Related Searches
Security Misconfigurations (8)
Golang Misconfigurations (8)
Scanner Misconfigurations (6)
Shell Misconfigurations (4)
Exploitation Misconfigurations (3)
Devsecops Misconfigurations (3)
Amazon Web Services Misconfigurations (3)
Penetration Testing Misconfigurations (3)
Vulnerabilities Misconfigurations (3)
1-15 of 15 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.