CyberSecurityUP / k8senumeration
Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments
☆12Updated last year
Alternatives and similar repositories for k8senumeration:
Users that are interested in k8senumeration are comparing it to the libraries listed below
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- Fast Path Traversal exploitation tool☆21Updated 10 months ago
- Subdomains scanner Spider☆13Updated 11 months ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated last year
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆17Updated last year
- MacOS SX (Stealer) Free 🕵️♂️💻(Passwords, cookies, Google Auth, History) Grabber 📤(uploadcare API for exfiltration)☆23Updated last month
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- Top 400 passwords as per HaveIBeenPwned☆21Updated 4 months ago
- MacroExploit use in excel sheet☆20Updated last year
- A network logging tool that logs per process activities☆32Updated last year
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆12Updated last year
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆11Updated 2 months ago
- A Red Teaming tool focused on profiling the target.☆26Updated 8 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆18Updated 5 months ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆31Updated 5 months ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 6 months ago
- ☆13Updated last year
- ☆14Updated last year
- Tools used for Pentesting☆22Updated last year
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆11Updated last month
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Updated last year
- Cobalt Strike BOFS☆15Updated last year
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆19Updated 3 months ago
- ☆24Updated last year
- Simple Shellcode Runner in Rust Language☆17Updated last year
- ☆11Updated 2 months ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆40Updated last year
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆18Updated last year