IhorKravchuk / it-securityView external linksLinks
it-security related scripts and tools
☆25Jun 7, 2019Updated 6 years ago
Alternatives and similar repositories for it-security
Users that are interested in it-security are comparing it to the libraries listed below
Sorting:
- Deploy an AWS Lambda function to delete backing snapshots when an AMI is deregistered.☆12Oct 28, 2019Updated 6 years ago
- Weak password☆24Nov 7, 2017Updated 8 years ago
- Amazon EC2 Container Service Agent☆11Jan 16, 2025Updated last year
- Track public endpoints and connections across AWS accounts using VPC Flow Logs☆12Jun 14, 2016Updated 9 years ago
- botnet scanner written in python☆14Apr 4, 2018Updated 7 years ago
- ☆13Nov 1, 2017Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Penetration Test Vulnerabilities Manager is an extension for Burp Suite, written in Jython. It was developed by Barak Tawily in order to …☆31Jul 25, 2021Updated 4 years ago
- Collection of tools for privesc on Linux☆34Aug 28, 2013Updated 12 years ago
- Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container☆32Apr 7, 2018Updated 7 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- Utilities for locally running and testing Python AWS Lambda functions☆15Sep 10, 2017Updated 8 years ago
- S2-055的环境,基于rest-show-case改造☆37Dec 7, 2017Updated 8 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Sep 24, 2012Updated 13 years ago
- Dockerised Version of Frida☆21May 10, 2023Updated 2 years ago
- Execute DLL via the Excel.Application object's RegisterXLL() method☆22Apr 17, 2021Updated 4 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆41Apr 28, 2018Updated 7 years ago
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 10 years ago
- ☆13Feb 25, 2014Updated 11 years ago
- 一些漏洞场景的还原,基于https://www.exploit-db.com/☆37Feb 7, 2018Updated 8 years ago
- Dexaran's Naming Service☆20Mar 22, 2023Updated 2 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- Opinionated layer for AWS CloudFormation☆17Aug 10, 2018Updated 7 years ago
- Simple, useful scripts for red/blue team situations☆22May 4, 2015Updated 10 years ago
- A project to create AWS Config Rules and use them to test AWS Resource compliance.☆21Jan 7, 2020Updated 6 years ago
- Auditing & Hardening script for Kubernetes☆46Apr 12, 2018Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- Get Slack notifications on AWS CloudWatch events☆19Dec 6, 2022Updated 3 years ago
- AWS Reserved Instances analysis and recommendations tool☆46Jun 16, 2016Updated 9 years ago
- lcx in python edition☆28Oct 27, 2017Updated 8 years ago
- ☆54Feb 27, 2017Updated 8 years ago
- 绕过burp破解版的截止日期限制. This is a tool to bypass the cracked version of the burpsuite_pro(Larry_Lau) certification deadline through time revers…☆23May 27, 2022Updated 3 years ago
- Quickly create, deploy, and manage AWS Lambda functions via AWS CloudFormation☆23Oct 23, 2019Updated 6 years ago
- The documents☆56Nov 2, 2017Updated 8 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Apr 14, 2017Updated 8 years ago
- DNS log http://zone.wooyun.org/content/27119☆21May 10, 2016Updated 9 years ago
- Web scan foundation framework☆23Nov 17, 2017Updated 8 years ago
- !!!不建议使用了,可以使用AuditBeat!!! Linux服务器命令监控辅助脚本,ElasticSearch + Logstash + Kibana + Redis + Auditd☆28Apr 10, 2019Updated 6 years ago