R3DRUN3 / cyberhallLinks
π‘οΈ π π₯·π» Everything CyberSecurity Related π΄ββ οΈ πΎ π΅πΎ
β24Updated last year
Alternatives and similar repositories for cyberhall
Users that are interested in cyberhall are comparing it to the libraries listed below
Sorting:
- Projects and Proof of Concepts regarding the cloud native world βοΈ πβ19Updated 6 months ago
- check for file differences in github repo folders π πβ18Updated this week
- A lightweight kubernetes operator to test cluster resilience via chaos engineering π£ βΈοΈβ27Updated 3 months ago
- Lightning node bot β‘π€β10Updated last year
- Pipeline for patching CVEs in container images ππ¦β20Updated last year
- π΄ββ οΈ Hacking Guides, Demos and Proof-of-Concepts π₯·β198Updated 2 weeks ago
- Get started with the Bitcoin Lightningβ‘ Network the "hard" way πͺβ17Updated last year
- Linux post exploitation tool for info gathering and exfiltration π§π‘πβ83Updated 4 months ago
- Nostr Osint Tool π π ¦β26Updated last year
- Mine Bitcoin Vanity Addresses βοΈπ °οΈπ ±οΈπ ΎοΈβ16Updated 8 months ago
- Terraform script to start one or more ec2 monero-mining instances. βοΈ πͺ βοΈβ12Updated 2 years ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.β143Updated 2 months ago
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Thβ¦β253Updated this week
- A Slack bot phishing framework for Red Teaming exercisesβ167Updated last year
- Discover and monitor internet assets using favicon hashes across search engines.β177Updated 5 months ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.comβ40Updated 5 months ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is makingβ103Updated last year
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.β229Updated 10 months ago
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security β¦β55Updated 7 months ago
- AI Powered Terminal Based Ethical Hacking Assistantβ69Updated 4 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.β124Updated 5 months ago
- This is the word list for fuzzing kubernetes.β11Updated last year
- π² Python project developed to help on the process of searching for vulnerabilities in Android mobile applications. It takes the APK fileβ¦β132Updated last month
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobsβ37Updated 9 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.β55Updated 5 months ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offeβ¦β139Updated 3 months ago
- The Common Vulnerabilities Exposures (CVE) Databaseβ30Updated 6 months ago
- Nuclei templates for honeypots detection.β196Updated last year
- Search for all leaked keys/secrets using one regex! bugbountyβ130Updated 2 months ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, aβ¦β97Updated 11 months ago