Accenture / jenkins-attack-framework
☆559Updated 3 years ago
Alternatives and similar repositories for jenkins-attack-framework:
Users that are interested in jenkins-attack-framework are comparing it to the libraries listed below
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆595Updated 4 years ago
- Log4Shell scanner for Burp Suite☆483Updated last year
- A utility to convert your AWS CLI credentials into AWS console access.☆235Updated 4 years ago
- ☆281Updated 3 years ago
- Hide your payload in DNS☆613Updated last year
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆427Updated 2 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆425Updated last year
- A tool to hunt for credentials in github wild AKA git*hunt☆294Updated 2 years ago
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆198Updated 2 years ago
- Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still…☆414Updated last month
- Log4j jndi injects the Payload generator☆486Updated 3 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆232Updated 3 years ago
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆351Updated 2 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆256Updated 2 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆266Updated last month
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆265Updated 2 years ago
- JMX enumeration and attacking tool.☆422Updated 2 months ago
- This repository contain any information that can be used to hack Kubernetes☆98Updated 2 years ago
- Amplify network visibility from multiple POV of other hosts☆302Updated 11 months ago
- Source Code Management Attack Toolkit☆214Updated 2 years ago
- A super small jsp webshell with file upload capabilities.☆293Updated 3 years ago
- RCE 0-day for GhostScript 9.50 - Payload generator☆545Updated 3 years ago
- Cloud-related research releases from the Rhino Security Labs team.☆382Updated 4 years ago
- S3 Account Search☆269Updated 5 months ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆439Updated last year
- Find cloud assets that no one wants exposed 🔎 ☁️☆338Updated 4 years ago
- List DTDs and generate XXE payloads using those local DTDs.☆620Updated last year
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆216Updated 4 years ago
- ☆291Updated 8 months ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆225Updated 4 years ago