CyberSecurityUP / k8senumeration
Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments
☆12Updated last year
Alternatives and similar repositories for k8senumeration:
Users that are interested in k8senumeration are comparing it to the libraries listed below
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- Fast Path Traversal exploitation tool☆21Updated 9 months ago
- Top 400 passwords as per HaveIBeenPwned☆21Updated 4 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 7 months ago
- A Red Teaming tool focused on profiling the target.☆26Updated 7 months ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆11Updated 2 months ago
- Enumeration & fingerprint tool☆24Updated 11 months ago
- Tool for scanning domains for .git directories.☆12Updated last year
- MacroExploit use in excel sheet☆20Updated last year
- Subdomains scanner Spider☆13Updated 11 months ago
- ☆13Updated last year
- Tools used for Pentesting☆22Updated last year
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆28Updated 6 months ago
- Burp extension used to snip any header from all the requests.☆22Updated last year
- This repository contains the best fuzzing wordlist files☆29Updated 2 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- A network logging tool that logs per process activities☆32Updated last year
- MacOS SX (Stealer) Free 🕵️♂️💻(Passwords, cookies, Google Auth, History) Grabber 📤(uploadcare API for exfiltration)☆23Updated 3 weeks ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated 11 months ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated last year
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆11Updated last month
- ☆21Updated 8 months ago
- ☆16Updated last year
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- Template Nuclei SSTI☆29Updated last year
- Challenge Python☆19Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 10 months ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆19Updated 3 months ago