☆54Dec 14, 2025Updated 3 months ago
Alternatives and similar repositories for k8s-chaos-engineering
Users that are interested in k8s-chaos-engineering are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆52Feb 10, 2026Updated 2 months ago
- KeySec Hunter is a **Chrome extension** that scans webpages and linked JavaScript files for **user-defined keywords** and **potential sec…☆59Dec 21, 2025Updated 3 months ago
- A powerful Burp Suite extension that imports Postman collections☆31Aug 1, 2025Updated 8 months ago
- HackList: Your go-to AI-powered guide to hands-on cybersecurity learning!☆24Jul 6, 2025Updated 9 months ago
- You can gather useful information accounts by username across all types networks ( which also include social media)☆28Oct 19, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A list of the best cybersecurity research related blogs.☆33May 26, 2025Updated 10 months ago
- A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities fou…☆84Nov 25, 2025Updated 4 months ago
- Beginner Road map that paves the way for your journey into the captivating world of cyber security based on job roles.☆25Jan 27, 2024Updated 2 years ago
- Hands-on Wireshark projects for beginners to learn network analysis and packet inspection.☆102May 30, 2024Updated last year
- TCM Security Academy Notes☆51Dec 3, 2025Updated 4 months ago
- Advanced APK analysis tool with intelligent caching, pattern matching, and comprehensive security vulnerability detection☆83Oct 21, 2025Updated 5 months ago
- My notes containing the Certified Red Team Professional Course☆70Sep 7, 2024Updated last year
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆70Jun 5, 2025Updated 10 months ago
- Save your dorking results to the terminal. A modified version of TomNomNom's amazing tool!☆98Mar 4, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆242Dec 10, 2025Updated 4 months ago
- This repository updates latest Bug Bounty medium writeups every 10 minutes, https://readmedium.com/Medium_URL, https://archive.ph/Medium_…☆167Updated this week
- A list of all Active Directory machines from HackTheBox☆236Updated this week
- Python script to decrypt passwords stored by mRemoteNG☆177Jul 6, 2023Updated 2 years ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆151Mar 20, 2024Updated 2 years ago
- PNPT Exam Preparation - TCM Security☆172Jul 25, 2021Updated 4 years ago
- POC exploit for CVE-2024-49138☆267Feb 14, 2025Updated last year
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆658Jan 16, 2026Updated 2 months ago
- ☆389Jun 25, 2025Updated 9 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆411Updated this week
- A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure cod…☆670Mar 25, 2026Updated 2 weeks ago
- Compilation of Resources for TCM's Linux Privilege Escalation course☆584Oct 23, 2020Updated 5 years ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆957May 21, 2025Updated 10 months ago
- A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for id…☆1,791Sep 11, 2025Updated 7 months ago
- Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop☆1,251Nov 2, 2022Updated 3 years ago
- Burp Suite Certified Practitioner Exam Study☆1,360Mar 12, 2026Updated 3 weeks ago
- A collection of tools to perform searches on GitHub.☆1,481Feb 9, 2023Updated 3 years ago
- Sample pentest report provided by TCM Security☆1,372Mar 18, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A big list of Android Hackerone disclosed reports and other resources.☆1,676Sep 10, 2025Updated 7 months ago
- Not The Hidden Wiki - The largest repository of links related to cybersecurity☆1,923Apr 1, 2026Updated last week
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,456Mar 2, 2026Updated last month
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,756Dec 18, 2021Updated 4 years ago
- Cybersecurity oriented awesome list☆3,548Updated this week
- ☆2,756Aug 7, 2024Updated last year
- A collection of snippets of codes and commands to make your life easier!☆2,895Sep 25, 2023Updated 2 years ago