Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.
☆24Apr 27, 2026Updated 3 weeks ago
Alternatives and similar repositories for encap-attack
Users that are interested in encap-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Jul 30, 2024Updated last year
- ☆30May 12, 2025Updated last year
- Java archive implant toolkit.☆61Apr 20, 2025Updated last year
- Dont Gamble with Risk☆14Mar 4, 2024Updated 2 years ago
- Security Alert Decoration☆27Jul 21, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆49Dec 29, 2023Updated 2 years ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆38Sep 25, 2024Updated last year
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆24Jun 14, 2023Updated 2 years ago
- Kubernetes audit logging, when you don't control the control plane☆90May 9, 2026Updated last week
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated 2 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- ☆41Nov 29, 2024Updated last year
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆93May 7, 2024Updated 2 years ago
- Dataset fingerprinting for AIBOM☆16Apr 8, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Find what egress ports are allowed☆47Nov 19, 2025Updated 6 months ago
- ☆33Aug 26, 2025Updated 8 months ago
- A multi-vault secret injection tool for safely injecting secrets into app environment☆133Mar 2, 2026Updated 2 months ago
- ☆16Mar 31, 2023Updated 3 years ago
- AWS honey token manager☆90Aug 1, 2024Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated 2 years ago
- A penetration toolkit for container environment☆140Updated this week
- ☆45May 12, 2025Updated last year
- A portable tool for parsing and analyzing Mach-O binaries.☆12Oct 31, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Easily generate reproducible infrastructure☆40Dec 3, 2025Updated 5 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆114Jan 2, 2025Updated last year
- ☆29Dec 26, 2025Updated 4 months ago
- Addon for BHCE☆57Apr 1, 2025Updated last year
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated 2 months ago
- Exit if environment variables known to be used as access tokens are set.☆15May 30, 2022Updated 3 years ago
- ☆25Jun 27, 2024Updated last year
- ☆22Apr 17, 2023Updated 3 years ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- self-hosted Azure OSINT tool☆35Jun 24, 2025Updated 10 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- AppArmor and Seccomp profiles for K8S images☆25Dec 9, 2025Updated 5 months ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- ☆12Mar 31, 2021Updated 5 years ago