Accenture / jenkins-attack-frameworkLinks
☆561Updated 4 years ago
Alternatives and similar repositories for jenkins-attack-framework
Users that are interested in jenkins-attack-framework are comparing it to the libraries listed below
Sorting:
- A utility to convert your AWS CLI credentials into AWS console access.☆240Updated 5 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆601Updated 4 years ago
- Log4Shell scanner for Burp Suite☆486Updated last year
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆267Updated 4 months ago
- ☆282Updated 3 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆434Updated 2 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆234Updated 3 years ago
- Log4j jndi injects the Payload generator☆487Updated 3 years ago
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆356Updated 3 years ago
- Hide your payload in DNS☆614Updated 2 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆440Updated 3 months ago
- JMX enumeration and attacking tool.☆443Updated 3 months ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆259Updated 2 years ago
- Source Code Management Attack Toolkit☆219Updated 2 years ago
- Standalone binaries for Linux/Windows of Impacket's examples☆730Updated last year
- A tool to hunt for credentials in github wild AKA git*hunt☆294Updated 2 years ago
- RCE 0-day for GhostScript 9.50 - Payload generator☆547Updated 3 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆220Updated 4 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆440Updated last year
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆612Updated 2 years ago
- List DTDs and generate XXE payloads using those local DTDs.☆631Updated last year
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆254Updated 2 years ago
- Java RMI Vulnerability Scanner☆870Updated 11 months ago
- Cloud-related research releases from the Rhino Security Labs team.☆388Updated 5 years ago
- project-blacklist3r☆562Updated 3 months ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆383Updated 4 years ago
- Overlord - Red Teaming Infrastructure Automation☆623Updated last year
- Everything you need about Burp Extension Generation☆154Updated 2 years ago
- Office 365 and Exchange Enumeration☆186Updated 6 years ago
- Damn Vulnerable Cloud Application☆193Updated 6 years ago