Accenture / jenkins-attack-frameworkLinks
☆561Updated 4 years ago
Alternatives and similar repositories for jenkins-attack-framework
Users that are interested in jenkins-attack-framework are comparing it to the libraries listed below
Sorting:
- A utility to convert your AWS CLI credentials into AWS console access.☆239Updated 5 years ago
- Log4Shell scanner for Burp Suite☆485Updated last year
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆259Updated 2 years ago
- ☆281Updated 3 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆600Updated 4 years ago
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆354Updated 3 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆267Updated 4 months ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆434Updated 2 years ago
- Hide your payload in DNS☆614Updated 2 years ago
- Everything you need about Burp Extension Generation☆154Updated 2 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆220Updated 4 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆345Updated 4 years ago
- A tool to hunt for credentials in github wild AKA git*hunt☆294Updated 2 years ago
- Source Code Management Attack Toolkit☆219Updated 2 years ago
- ☆250Updated 11 months ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆266Updated 2 years ago
- A super small jsp webshell with file upload capabilities.☆300Updated 3 years ago
- Office 365 and Exchange Enumeration☆186Updated 6 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆483Updated 11 months ago
- JMX enumeration and attacking tool.☆441Updated 2 months ago
- Standalone binaries for Linux/Windows of Impacket's examples☆730Updated last year
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆222Updated 2 years ago
- ☆334Updated 2 years ago
- Disposable and resilient red team infrastructure with Terraform☆267Updated 6 years ago
- .NET Project for Attacking vCenter☆542Updated 3 years ago
- ☆293Updated 11 months ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆439Updated 2 months ago
- Log4j jndi injects the Payload generator☆487Updated 3 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆234Updated 3 years ago
- A tool to make socks connections through HTTP agents☆706Updated 4 years ago