Rolix44 / Kubestroyer
Kubernetes exploitation tool
☆361Updated 8 months ago
Alternatives and similar repositories for Kubestroyer:
Users that are interested in Kubestroyer are comparing it to the libraries listed below
- Session Hijacking Visual Exploitation☆197Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆464Updated 7 months ago
- Source Code Management Attack Toolkit☆214Updated 2 years ago
- reverse shell using curl☆454Updated 11 months ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆325Updated 3 weeks ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆273Updated last month
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆534Updated 4 months ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆629Updated last year
- A Go-based Exploit Framework☆326Updated this week
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆391Updated 2 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆238Updated last week
- Kraken, a modular multi-language webshell coded by @secu_x11☆538Updated last year
- Azure mindmap for penetration tests☆179Updated last year
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty☆203Updated 2 months ago
- FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE acces…☆411Updated last month
- ☆233Updated 4 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆180Updated 11 months ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆156Updated 4 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆258Updated 2 weeks ago
- ↕️🤫 Stealth redirector for your red team operation security☆670Updated 7 months ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆452Updated 9 months ago
- Black box fuzzer for web applications☆426Updated 8 months ago
- A library for detecting known secrets across many web frameworks☆605Updated this week
- nysm is a stealth post-exploitation container.☆245Updated last year
- Zero-dollar attack surface management tool☆276Updated 11 months ago
- ArgFuscator.net is an open-source, stand-alone web application that helps generate obfuscated command lines for common system-native exec…☆165Updated last month
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆198Updated 2 years ago
- This is a PoC code to exploit the IngressNightmare vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974).☆108Updated this week
- ☆290Updated 7 months ago
- Cloud agnostic IAM permissions enumerator☆140Updated 7 months ago