Skip to content
View PercussiveElbow's full-sized avatar
👨‍💻
👨‍💻

Block or report PercussiveElbow

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

Collection of incidents resulting from caching issues

25 2 Updated Jul 25, 2024

Antivirus for Amazon S3

Java 525 127 Updated Sep 20, 2023

Add your HDD, SSD and NVMe drives to your Synology's compatible drive database and a lot more

Shell 2,408 164 Updated Sep 11, 2024

Runs checks to see if an EKS cluster follows EKS Best Practices.

Python 838 86 Updated Jul 25, 2024

Vulnerability scanner written in Go which uses the data provided by https://osv.dev

Go 6,108 343 Updated Sep 11, 2024

Automation to assess the state of your M365 tenant against CISA's baselines

Open Policy Agent 1,575 213 Updated Sep 11, 2024

A crowd sourced list of phishing training simulators and their signatures

16 2 Updated May 23, 2024

Unauthenticated enumeration of AWS, Azure, and GCP Principals

Python 197 29 Updated Jul 12, 2024

A repository of breaches of AWS customers

686 40 Updated Aug 30, 2024

No need for IAM users when we have Yubikeys

Go 158 7 Updated Apr 7, 2022

Fake Protocol Server

Python 1,513 178 Updated Jan 20, 2023

awesome-linux-rootkits

1,672 234 Updated Jan 27, 2023

Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.

Ruby 519 48 Updated Apr 10, 2024

Hardening a sketchy containerized application one step at a time

Go 54 7 Updated Jan 25, 2022

A PowerShell script for performing a build review of a Windows host

PowerShell 23 7 Updated Mar 11, 2019

This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS weaknesses you will be verse enough to provide the correct coun…

165 34 Updated Mar 1, 2019

Code signing and transparency for containers and binaries

Go 4,369 531 Updated Sep 10, 2024

🚧 Under evaluation - Crystal Domain Name System Resolver

Crystal 14 2 Updated May 28, 2024

💎 Artichoke is a Ruby made with Rust

Rust 3,032 111 Updated Sep 10, 2024

Routopsy - Hacking Routers with Routers

Python 167 40 Updated Jul 30, 2021

MaxMind DB Reader for Crystal

Crystal 23 5 Updated Feb 3, 2023

Selenium alternative for Crystal. Browser manipulation without the Java overhead.

Crystal 181 14 Updated Nov 23, 2023

[MAMIP] Monitor AWS Managed IAM Policies Changes

Python 467 31 Updated Sep 11, 2024

Crystal shard wrapping the rbsec/sslscan utility

Crystal 10 Updated Oct 25, 2021

NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by anyone on the victim's network visiting a website

Perl 1,894 206 Updated Jan 14, 2023

Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop

C++ 1,051 167 Updated Nov 2, 2022

A list of published research documents

C 240 53 Updated Jul 10, 2024

This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.

Python 1,963 398 Updated Aug 19, 2024

A vulnerability scanner for container images and filesystems

Go 8,450 548 Updated Sep 11, 2024
Next