Rolix44 / KubestroyerLinks
Kubernetes exploitation tool
☆363Updated last year
Alternatives and similar repositories for Kubestroyer
Users that are interested in Kubestroyer are comparing it to the libraries listed below
Sorting:
- reverse shell using curl☆460Updated last year
- Cloud agnostic IAM permissions enumerator☆157Updated 5 months ago
- ☆540Updated 2 weeks ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆298Updated last month
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆339Updated 6 months ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆467Updated last year
- ☆90Updated last month
- Session Hijacking Visual Exploitation☆204Updated last year
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆378Updated 4 months ago
- A library for detecting known secrets across many web frameworks☆696Updated this week
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆163Updated 9 months ago
- Zero-dollar attack surface management tool☆297Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆163Updated last week
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆274Updated this week
- A source code static analysis platform for AppSec enthusiasts.☆258Updated 6 months ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆547Updated last year
- A Go-based Exploit Framework☆359Updated this week
- nysm is a stealth post-exploitation container.☆260Updated 2 months ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty☆209Updated 5 months ago
- 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.☆424Updated last month
- Azure mindmap for penetration tests☆188Updated last year
- This is a PoC code to exploit the IngressNightmare vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974).☆208Updated 5 months ago
- ☆236Updated 9 months ago
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆226Updated 3 years ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆465Updated last year
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆191Updated 9 months ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆444Updated 3 weeks ago
- ☆314Updated 2 months ago
- Azure DevOps Services Attack Toolkit☆298Updated 6 months ago
- Black box fuzzer for web applications☆432Updated last month