R3DRUN3 / cyberhallLinks
π‘οΈ π π₯·π» Everything CyberSecurity Related π΄ββ οΈ πΎ π΅πΎ
β24Updated last year
Alternatives and similar repositories for cyberhall
Users that are interested in cyberhall are comparing it to the libraries listed below
Sorting:
- check for file differences in github repo folders π πβ18Updated last week
- Projects and Proof of Concepts regarding the cloud native world βοΈ πβ19Updated 7 months ago
- π΄ββ οΈ Hacking Guides, Demos and Proof-of-Concepts π₯·β200Updated 2 weeks ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.β146Updated 2 months ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.comβ40Updated 6 months ago
- Pipeline for patching CVEs in container images ππ¦β20Updated last year
- Dredging up secrets from the depths of the file systemβ128Updated 8 months ago
- Service that scans your Infrastructure as Code for common vulnerabilitiesβ49Updated last year
- AI Powered Terminal Based Ethical Hacking Assistantβ70Updated 5 months ago
- Linux post exploitation tool for info gathering and exfiltration π§π‘πβ83Updated 5 months ago
- π Visualize and explore IaC βοΈ Create and share notes in VS Code π€ Sync notes and findings in real-time with friendsβ73Updated last year
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.β148Updated last month
- HTTP Requests for security researchersβ64Updated 2 years ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is makingβ102Updated last year
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocketβ79Updated 2 weeks ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, aβ¦β98Updated last year
- A utility for recursively traversing SSL/TLS certificates for collecting DNS namesβ47Updated last year
- A lightweight kubernetes operator to test cluster resilience via chaos engineering π£ βΈοΈβ27Updated 4 months ago
- Kubernetes pentesting, hardening and hunting tools.β68Updated 2 years ago
- All of our GitHub Actions rolled into one. Or as we like to say: One GitHub Action to rule them all!β21Updated 2 years ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.β171Updated 5 months ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.β48Updated 4 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.β21Updated 10 months ago
- Check IP addresses against known cloud provider IP address rangesβ45Updated last year
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.β124Updated 5 months ago
- Drill into WARC web archivesβ140Updated 9 months ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.β230Updated 11 months ago
- The Most Advanced Client-Side Prototype Pollution Scannerβ226Updated 3 weeks ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation fβ¦β189Updated last year
- Leaky Vessels Dynamic Detectorβ102Updated 3 months ago