CERT-W / hadoop-attack-library
A collection of pentest tools and resources targeting Hadoop environments
☆34Updated 7 years ago
Related projects: ⓘ
- Opening CobaltStrike to a wider world☆8Updated 6 years ago
- Materials for 44con 2014 CANAPE Workshop☆22Updated 10 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12Updated 9 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 8 years ago
- A tool to analyse JMX API security level.☆43Updated 10 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆23Updated 6 years ago
- Mixing up CVE and MS like a pro☆24Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- Office 365 MFA capture toolkit☆12Updated 7 years ago
- ☆14Updated this week
- A brute force program to test weak accounts configured to access a JMX Registry☆33Updated 7 years ago
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆25Updated 9 years ago
- ☆46Updated 6 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 3 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Deliberately vulnerable web application☆22Updated 7 years ago
- ☆25Updated 3 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 6 years ago
- REST/JSON interface to Burp Suite☆33Updated 3 years ago
- Nashorn Post Exploitation☆31Updated 6 years ago
- Source Code Intelligence☆30Updated 7 years ago
- ☆14Updated this week
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- ☆10Updated 6 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 6 years ago
- ☆42Updated this week