NodyHub / k8s-ctf-rocksView external linksLinks
Kubernetes Easter CTF
☆59Jul 10, 2020Updated 5 years ago
Alternatives and similar repositories for k8s-ctf-rocks
Users that are interested in k8s-ctf-rocks are comparing it to the libraries listed below
Sorting:
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Updated this week
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- ☆13Oct 29, 2024Updated last year
- Python Library for ConfigExtractor☆14Feb 4, 2026Updated last week
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 5 months ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 2 years ago
- ☆13May 17, 2016Updated 9 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- Some helpful Helm Charts for pentesters☆38Jan 28, 2019Updated 7 years ago
- Public release of Whalehoney Honeypot☆29Mar 21, 2022Updated 3 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 4 years ago
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆12Aug 1, 2021Updated 4 years ago
- PoC for extracting office files into PDF file metadata☆11Sep 11, 2019Updated 6 years ago
- The BlackAlps 2019 badge☆10Dec 4, 2021Updated 4 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- ☆20Feb 6, 2024Updated 2 years ago
- Lab Material for the Two-Day Defending Modern DevOps Environments Course☆126Dec 4, 2019Updated 6 years ago
- ☆94Oct 13, 2022Updated 3 years ago
- Visualize your Terraform files☆34Sep 9, 2020Updated 5 years ago
- jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()…☆11Apr 9, 2021Updated 4 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Simple tmux session management.☆16Dec 16, 2023Updated 2 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- Objectify-s3 is a tool that recursively checks AWS S3 buckets and objects for misconfigured permissions.☆15Aug 3, 2024Updated last year
- A script to automate Jenkins credential store decryption☆17May 29, 2018Updated 7 years ago
- Docker Automated Build for Security Testing Tools☆14Apr 8, 2022Updated 3 years ago
- (Unofficial) Ruby wrapper for the Bugcrowd HTTP API☆14Feb 27, 2017Updated 8 years ago
- Fuzzing things with afl and python-afl☆59Jul 14, 2016Updated 9 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Aug 19, 2025Updated 5 months ago
- ☆17May 17, 2023Updated 2 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Oct 10, 2016Updated 9 years ago
- Our fork of Iceman's fork for Proxmark III☆18Dec 14, 2024Updated last year