0x5ubt13 / kubenumerate
Enumerate your Kubernetes cluster with just 1 command
☆10Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for kubenumerate
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆131Updated 2 months ago
- Ping-based Information Lookup and Outbound Transfer☆75Updated 6 months ago
- Automatically detect potential vulnerabilities and analyze repository metrics to prioritize open source security research targets☆154Updated this week
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆100Updated 8 months ago
- A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK i…☆112Updated last year
- linikatz is a tool to attack AD on UNIX☆137Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- ☆46Updated 2 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆118Updated 7 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆116Updated 2 months ago
- Python utility that generates "imageless" QR codes in various formats☆99Updated 3 months ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆174Updated last month
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆228Updated 7 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆131Updated 3 months ago
- Artifact monitoring that ensures fairplay☆66Updated last year
- Azure mindmap for penetration tests☆161Updated 11 months ago
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆189Updated 2 years ago
- Canary Detection☆160Updated 7 months ago
- Dredging up secrets from the depths of the file system☆116Updated last week
- A Red Team Activity Hub☆172Updated this week
- ☆91Updated 2 years ago
- A Burp extension to help pentesters copy requests / responses for reports.☆34Updated 4 months ago
- A public, open source physical security methodology☆43Updated 7 months ago
- ☆169Updated last month
- ☆115Updated last year
- Get root via TTY / TIOCSTI stuffing☆63Updated 3 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆111Updated 5 months ago
- Python code to Serialize and Unserialize java binary serialization format.☆17Updated 10 months ago
- All kinds of tiny shells☆59Updated last year