ProfessionallyEvil / harpoon
A collection of scripts, and tips and tricks for hacking k8s clusters and containers.
☆134Updated 4 months ago
Alternatives and similar repositories for harpoon:
Users that are interested in harpoon are comparing it to the libraries listed below
- Burp with Friends☆101Updated 2 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆201Updated last year
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆90Updated 6 years ago
- Disposable and resilient red team infrastructure with Terraform☆260Updated 6 years ago
- JIRA Secure Attachment Looter☆69Updated 4 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Updated 4 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- A tool to enumerate S3 buckets manually or via certstream☆80Updated last year
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆138Updated 5 years ago
- For all your network pentesting needs☆152Updated 7 months ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- ☆122Updated 6 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆106Updated 5 years ago
- Simple python script to extract unsafe functions from php projects☆197Updated 6 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- ☆34Updated 4 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Updated 5 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆245Updated 7 months ago
- A Linux enumeration script for Hack The Box☆187Updated 5 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆225Updated 4 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- An Insider Threat Toolkit☆149Updated 6 years ago
- Scripts to execute enumeration via LFI☆90Updated 5 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆62Updated 2 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆105Updated 5 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆209Updated 4 years ago
- Pypykatz server☆125Updated 5 years ago