TheSecureTux / redteam-k8spwn
Reverse shell container for k8s deployments
☆49Updated 5 years ago
Alternatives and similar repositories for redteam-k8spwn:
Users that are interested in redteam-k8spwn are comparing it to the libraries listed below
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Updated 7 years ago
- ☆27Updated 3 months ago
- Docker image for PowerShell remoting from Linux to Windows☆35Updated 6 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- ☆25Updated 3 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆15Updated 6 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 7 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Docker auditing and enumeration script.☆22Updated 5 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 6 years ago
- Run commands over RDP on massive number of hosts☆11Updated 6 years ago
- Lair Framework dockerized.☆37Updated 3 years ago
- Packer and vagrant scripts to automate building Windows and Linux machines on vCenter☆17Updated 5 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Updated 7 years ago
- Keyhack - Golang API token/webhook validator☆16Updated 5 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆26Updated 2 months ago
- Zone transfers for rwhois☆20Updated 5 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- List of metadata service endpoints for different cloud providers for your pentesting needs.☆14Updated 5 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- A script to automate Jenkins credential store decryption☆17Updated 6 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated last year
- A fileless Windows keylogger that exfils via DNS.☆32Updated 7 years ago
- Hugo repository for main ironpeak.be website.☆12Updated 4 months ago
- Redis Security Map - Anti-hacking for Redis☆32Updated 2 years ago
- ☆11Updated 6 years ago