Rolix44 / KubestroyerLinks
Kubernetes exploitation tool
☆359Updated 10 months ago
Alternatives and similar repositories for Kubestroyer
Users that are interested in Kubestroyer are comparing it to the libraries listed below
Sorting:
- reverse shell using curl☆456Updated last year
- ☆457Updated this week
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆564Updated 6 months ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆333Updated 2 months ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆637Updated 11 months ago
- Source Code Management Attack Toolkit☆219Updated 2 years ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆461Updated 11 months ago
- Azure mindmap for penetration tests☆185Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆280Updated 3 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆249Updated 2 weeks ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆544Updated last year
- nysm is a stealth post-exploitation container.☆248Updated last year
- Cloud agnostic IAM permissions enumerator☆149Updated last month
- Redeye is a tool intended to help you manage your data during a pentest operation☆465Updated 9 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆118Updated last year
- A python tool to automate KeePass discovery and secret extraction.☆487Updated 5 months ago
- In-depth ldap enumeration utility☆478Updated last month
- ☆293Updated 9 months ago
- ☆543Updated last year
- Session Hijacking Visual Exploitation☆200Updated last year
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆261Updated 2 months ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆190Updated 6 months ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆395Updated 4 months ago
- Zero-dollar attack surface management tool☆288Updated last year
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆450Updated last year
- ☆83Updated last month
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆347Updated last year
- Black box fuzzer for web applications☆426Updated 10 months ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆366Updated 2 weeks ago
- 🧰 Multi Tool Kubernetes Pentest Image☆232Updated last month