A tool for automatically gathering sensitive information from exposed Jenkins servers
☆104Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for Jenkins-Pillage
Users that are interested in Jenkins-Pillage are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago
- A Burp extension to show the Collaborator client in a tab☆36Dec 23, 2022Updated 3 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆135Jan 15, 2020Updated 6 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆535Mar 7, 2022Updated 4 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆205Feb 15, 2024Updated 2 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆10Jan 29, 2022Updated 4 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Jul 20, 2022Updated 3 years ago
- Generate pentest reports based on github issues.☆15Dec 8, 2022Updated 3 years ago
- Burp Suite Extension to monitor new scope☆200Mar 31, 2021Updated 5 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A bash script that fetches and maintains thousands of DNS resolvers☆65Aug 24, 2020Updated 5 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Dec 12, 2019Updated 6 years ago
- A tool that turns the authoritative nameservers of DNS providers to resolvers and resolves the target domain list. Please think of this a…☆25Sep 19, 2019Updated 6 years ago
- SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt…☆195Jun 30, 2019Updated 6 years ago
- rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments☆250Oct 15, 2019Updated 6 years ago
- Burp Suite extension to discover assets from HTTP response.☆233Jan 22, 2025Updated last year
- A horizontal and vertical web content enumerator☆50Updated this week
- Notes about attacking Jenkins servers☆2,092Jul 10, 2024Updated last year
- Python automation of Docker.sock abuse☆211Dec 8, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Scan and categorize websites for rapid triage☆12Jun 23, 2022Updated 3 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆660Feb 1, 2025Updated last year
- Fetch known urls from AlienVault's Open Threat Exchange for given hosts☆63Jul 22, 2019Updated 6 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 7 years ago
- Some scripts and exploits☆149Jul 9, 2018Updated 7 years ago
- Reconnaissance test in Kubernetes clusters☆21Oct 19, 2018Updated 7 years ago
- Automates credential skimming from service accounts in Windows Registry☆78Sep 29, 2020Updated 5 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago
- locate and attack Lync/Skype for Business☆345Oct 1, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Burp Scanner extension to fingerprint and actively scan instances of the Adobe Experience Manager CMS. It checks the website for common m…☆76Mar 22, 2024Updated 2 years ago
- secretz, minimizing the large attack surface of Travis CI☆325May 30, 2022Updated 3 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- Collection of metasploit modules☆69Mar 1, 2017Updated 9 years ago
- notorious BIG IP☆15Aug 8, 2019Updated 6 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago