A collection of pentest tools and resources targeting Hadoop environments
☆35Mar 2, 2017Updated 9 years ago
Alternatives and similar repositories for hadoop-attack-library
Users that are interested in hadoop-attack-library are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆266Sep 9, 2021Updated 4 years ago
- ☆28Apr 3, 2018Updated 7 years ago
- Tool for exploiting sixnet RTUs☆16Mar 15, 2018Updated 8 years ago
- CICSpwn is a tool to pentest a CICS Transaction servers on z/OS.☆86Oct 23, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A simplified SMB Email Client Attack script used for pentests.☆29Jan 31, 2019Updated 7 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 4 months ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆25Sep 26, 2023Updated 2 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- Simple golang reverse shell☆20Jan 22, 2020Updated 6 years ago
- Google Cloud Platform Security Tool☆235Jul 30, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Ansible Provisioned Security Testing Platform☆17Oct 19, 2016Updated 9 years ago
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆65Mar 4, 2026Updated 3 weeks ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Some Ghidra scripts to automate my reverse-engineering tasks☆21Mar 18, 2021Updated 5 years ago
- ☆18Feb 25, 2024Updated 2 years ago
- Socks5 server over Websockets☆40Oct 17, 2018Updated 7 years ago
- SlyPI☆20Jun 13, 2013Updated 12 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- RACF and z/OS tools and info☆35Aug 5, 2025Updated 7 months ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆62Jul 8, 2017Updated 8 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- SharpAddDomainMachine☆69Oct 12, 2021Updated 4 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Nov 15, 2016Updated 9 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Nov 10, 2018Updated 7 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆45Dec 24, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- Stay on top of new domains! Bug bounty hunters can use this tool to receive Pushbullet notifications each time there is a new target subd…☆26Apr 14, 2018Updated 7 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- Domain fronting using Google app engine☆53Feb 19, 2018Updated 8 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Mar 19, 2015Updated 11 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35May 7, 2015Updated 10 years ago
- A tool to analyse JMX API security level.☆44Jul 23, 2014Updated 11 years ago