Rolix44 / KubestroyerLinks
Kubernetes exploitation tool
☆362Updated last year
Alternatives and similar repositories for Kubestroyer
Users that are interested in Kubestroyer are comparing it to the libraries listed below
Sorting:
- reverse shell using curl☆459Updated last year
- ☆525Updated last month
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆340Updated 5 months ago
- A Go-based Exploit Framework☆349Updated this week
- Session Hijacking Visual Exploitation☆201Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆294Updated this week
- CVE-2023-24055 PoC (KeePass 2.5x)☆254Updated 2 years ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆468Updated 11 months ago
- Cloud agnostic IAM permissions enumerator☆151Updated 3 months ago
- ☆296Updated 3 weeks ago
- ☆89Updated last week
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆162Updated 2 weeks ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆376Updated 2 months ago
- A source code static analysis platform for AppSec enthusiasts.☆253Updated 5 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆271Updated 4 months ago
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆161Updated 8 months ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆191Updated 8 months ago
- nysm is a stealth post-exploitation container.☆253Updated last month
- Kraken, a modular multi-language webshell coded by @secu_x11☆548Updated last year
- A library for detecting known secrets across many web frameworks☆662Updated 2 weeks ago
- Golang weaponization for red teamers.☆499Updated last year
- A python tool to automate KeePass discovery and secret extraction.☆495Updated 7 months ago
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆264Updated last year
- Zero-dollar attack surface management tool☆295Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆586Updated 8 months ago
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆214Updated 3 years ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty☆208Updated 3 months ago
- Azure mindmap for penetration tests☆186Updated last year
- Blazing fast, advanced Padding Oracle exploit☆254Updated last year
- APIDetector: Efficiently scan for exposed Swagger endpoints across web domains and subdomains. Supports HTTP/HTTPS, multi-threading, and …☆328Updated 4 months ago