Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments
☆12Nov 23, 2023Updated 2 years ago
Alternatives and similar repositories for k8senumeration
Users that are interested in k8senumeration are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripting together some of my favorite Python tools for doing initial triage of a suspected malicious document (e.g. PDF, DOC, DOCX, XSLM…☆17Mar 8, 2022Updated 4 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆21Mar 9, 2026Updated last month
- Red Team Operations Framework☆24Jul 14, 2024Updated last year
- Minimalist resources to learn about pentesting smart contracts, from lab to practice, ctf and some recommendations.☆20Jun 27, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆17Aug 7, 2024Updated last year
- ☆19Nov 28, 2024Updated last year
- Attach an executable file and use JavaScript to download the attachment☆34May 9, 2019Updated 6 years ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Feb 22, 2025Updated last year
- ☆14Dec 28, 2024Updated last year
- Comunidade Brasileira de Cibersegurança☆24Oct 6, 2025Updated 6 months ago
- ⚔️ A command-line tool for IP address and URL obfuscation/de-obfuscation, providing diverse techniques for enhanced privacy and security.☆27Apr 28, 2025Updated 11 months ago
- A super-fast proxy server port scanner一个超级快的端口扫描器☆24Aug 31, 2025Updated 7 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆12Dec 9, 2024Updated last year
- CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.☆37Sep 14, 2025Updated 7 months ago
- ☆15Apr 9, 2026Updated 2 weeks ago
- Python script implementing the favicon hash trick to find subdomains.☆40Mar 28, 2023Updated 3 years ago
- New Framework Red Team Operations☆21Jun 7, 2021Updated 4 years ago
- Sec-Payloads, It's a collection of multiple types of lists used during security assessments & used for bug bounty hunting or penetration …☆10Nov 17, 2025Updated 5 months ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- Django middleware and signals for handling security events☆14Apr 14, 2021Updated 5 years ago
- setup wazuh to serve multiple organizations on a single instance.☆12Dec 29, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This is a smart contract tutorial, this tutorial guide you how to compile & deploy a mintable ERC20 token smart contract using client sid…☆13Oct 6, 2018Updated 7 years ago
- BlitzSSH is a multi-threaded SSH brute-force tool with Telegram integration for real-time notifications.☆15Nov 20, 2025Updated 5 months ago
- ☆25Feb 7, 2026Updated 2 months ago
- Find subdomains on GitLab.☆108Apr 28, 2024Updated last year
- Base OKE automated deployment with extras, to be used alone or by other Quickstarts☆13Jun 20, 2025Updated 10 months ago
- ☆22Apr 14, 2026Updated last week
- This plant leaf disease detection project was developed using Python, Flask, TensorFlow, and NumPy. The model was trained over 3000+ data…☆12Jul 30, 2023Updated 2 years ago
- A checklist for systematically going through the OWASP Testing Guide V4☆17Jan 14, 2025Updated last year
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆21Sep 12, 2022Updated 3 years ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆57Jun 30, 2025Updated 9 months ago
- Self made codes of Design and Analysis of Algorithms Lab during my third year of BTech.☆13Feb 17, 2020Updated 6 years ago
- Git-eXposed is a tool designed to detect and extract sensitive information from exposed Git repositories☆11Sep 26, 2024Updated last year
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Enrich your investigations on IPs, Domains etc. with OSINT☆65Apr 4, 2024Updated 2 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago