SunWeb3Sec / Kubernetes-security
Kubernetes pentesting, hardening and hunting tools.
☆60Updated 2 years ago
Alternatives and similar repositories for Kubernetes-security:
Users that are interested in Kubernetes-security are comparing it to the libraries listed below
- This repository contain any information that can be used to hack Kubernetes☆100Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆62Updated 4 months ago
- ☆111Updated 2 years ago
- Repository of CVE found by OCD people☆75Updated 6 months ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆85Updated 11 months ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆27Updated last year
- ☆31Updated 2 years ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆173Updated last year
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆180Updated 2 years ago
- Burp Suite's extension to scan and crawl Single Page Applications☆100Updated last year
- Improve automated and semi-automated active scanning in Burp Pro☆60Updated 2 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆94Updated last year
- ☆113Updated last year
- Nuclei templates for K8S security scanning☆101Updated 3 years ago
- Cloud agnostic IAM permissions enumerator☆139Updated 5 months ago
- Web CTF CheatSheet 🐈☆33Updated 5 years ago
- List all public repositories for (valid) GitHub usernames☆68Updated last year
- ☆104Updated 2 years ago
- ☆93Updated 2 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆117Updated last year
- A penetration testing and vulnerability management application written using the powerful django framework.☆29Updated last year
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆67Updated 2 years ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆71Updated 11 months ago
- My talks...☆23Updated 3 months ago
- A list of threat sinks used in the manual security source code review for application security☆70Updated last year
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆83Updated last year
- Striping CDN IPs from a list of IP Addresses☆75Updated 2 years ago
- Monitoring the Cloud Landscape☆78Updated last month
- ☆53Updated 8 months ago
- ☆78Updated 6 months ago