Accenture / jenkins-attack-framework
☆560Updated 3 years ago
Alternatives and similar repositories for jenkins-attack-framework:
Users that are interested in jenkins-attack-framework are comparing it to the libraries listed below
- A utility to convert your AWS CLI credentials into AWS console access.☆237Updated 4 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆595Updated 4 years ago
- Log4Shell scanner for Burp Suite☆484Updated last year
- Hide your payload in DNS☆613Updated last year
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆432Updated 2 years ago
- Source Code Management Attack Toolkit☆215Updated 2 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆435Updated last month
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆258Updated 2 years ago
- Log4j jndi injects the Payload generator☆486Updated 3 years ago
- ☆281Updated 3 years ago
- CSTC is a Burp Suite extension that allows request/response modification using a GUI analogous to CyberChef☆232Updated last week
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆267Updated 2 months ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆233Updated 3 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆611Updated 2 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆266Updated 2 years ago
- ☆293Updated 9 months ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆229Updated 4 years ago
- S3 Account Search☆4Updated 6 months ago
- ☆334Updated 2 years ago
- JMX enumeration and attacking tool.☆434Updated last month
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆353Updated 3 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆439Updated last year
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆120Updated 5 years ago
- Damn Vulnerable Cloud Application☆193Updated 6 years ago
- Everything you need about Burp Extension Generation☆153Updated 2 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆173Updated 5 months ago
- A super small jsp webshell with file upload capabilities.☆294Updated 3 years ago
- A tool to hunt for credentials in github wild AKA git*hunt☆294Updated 2 years ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆292Updated 2 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆217Updated 4 years ago