A collection of pentest tools and resources targeting Hadoop environments
☆35Mar 2, 2017Updated 9 years ago
Alternatives and similar repositories for hadoop-attack-library
Users that are interested in hadoop-attack-library are comparing it to the libraries listed below
Sorting:
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- ☆28Apr 3, 2018Updated 7 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆266Sep 9, 2021Updated 4 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Jan 31, 2019Updated 7 years ago
- ☆11Oct 28, 2016Updated 9 years ago
- Some Ghidra scripts to automate my reverse-engineering tasks☆21Mar 18, 2021Updated 4 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Jul 4, 2017Updated 8 years ago
- brocon-15 scripts☆13Apr 3, 2017Updated 8 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- Simple golang reverse shell☆20Jan 22, 2020Updated 6 years ago
- ☆18Feb 25, 2024Updated 2 years ago
- Ansible Provisioned Security Testing Platform☆17Oct 19, 2016Updated 9 years ago
- Google Cloud Platform Security Tool☆235Jul 30, 2019Updated 6 years ago
- SlyPI☆20Jun 13, 2013Updated 12 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Fly into Gophish with One Click (Infra Automation)☆52Mar 30, 2023Updated 2 years ago
- CICSpwn is a tool to pentest a CICS Transaction servers on z/OS.☆86Oct 23, 2020Updated 5 years ago
- HackerOne Public Disclosure Slack Bot☆20Sep 19, 2022Updated 3 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- Automated threat intelligence collection with McAfee ATD, OpenDXL and MISP☆22Feb 21, 2020Updated 6 years ago
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated last month
- Carve files for MFT entries (eg. blkls output or memory dumps). Recovers filenames (long & short), timestamps ($STD & $FN) and data if re…☆22Jun 3, 2019Updated 6 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Mar 19, 2015Updated 10 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- A PowerShell module to assist in parsing and managing catalog files.☆22Jan 12, 2017Updated 9 years ago
- PoC for CVE-2018-1002105.☆222Dec 21, 2018Updated 7 years ago
- .NET 4.0 Fast Directory / File Lister☆27Sep 25, 2020Updated 5 years ago