akintunero / k8s-chaos-engineeringView external linksLinks
☆54Dec 14, 2025Updated 2 months ago
Alternatives and similar repositories for k8s-chaos-engineering
Users that are interested in k8s-chaos-engineering are comparing it to the libraries listed below
Sorting:
- Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.☆19May 26, 2025Updated 8 months ago
- A powerful Burp Suite extension that imports Postman collections☆31Aug 1, 2025Updated 6 months ago
- HackList: Your go-to AI-powered guide to hands-on cybersecurity learning!☆24Jul 6, 2025Updated 7 months ago
- You can gather useful information accounts by username across all types networks ( which also include social media)☆27Oct 19, 2023Updated 2 years ago
- My notes containing the Certified Red Team Professional Course☆68Sep 7, 2024Updated last year
- Hands-on Wireshark projects for beginners to learn network analysis and packet inspection.☆98May 30, 2024Updated last year
- Advanced APK analysis tool with intelligent caching, pattern matching, and comprehensive security vulnerability detection☆83Oct 21, 2025Updated 3 months ago
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆81Aug 20, 2023Updated 2 years ago
- ☆235Dec 10, 2025Updated 2 months ago
- Save your dorking results to the terminal. A modified version of TomNomNom's amazing tool!☆98Mar 4, 2025Updated 11 months ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆148Sep 4, 2025Updated 5 months ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆150Mar 20, 2024Updated last year
- PNPT Exam Preparation - TCM Security☆171Jul 25, 2021Updated 4 years ago
- Learn how to conduct advanced searching of the World Wide Web☆293Jul 15, 2025Updated 7 months ago
- ☆362Jun 25, 2025Updated 7 months ago
- A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure cod…☆580Nov 23, 2025Updated 2 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆348Oct 22, 2024Updated last year
- Web recon script. No need to fear, sumrecon is here!☆394Oct 10, 2022Updated 3 years ago
- Compilation of Resources for TCM's Linux Privilege Escalation course☆581Oct 23, 2020Updated 5 years ago
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆793Oct 23, 2020Updated 5 years ago
- Windows AV Evasion☆832Apr 13, 2020Updated 5 years ago
- how to look for Leaked Credentials !☆1,031May 6, 2024Updated last year
- Obtain GraphQL API schema even if the introspection is disabled☆1,383Dec 5, 2025Updated 2 months ago
- Sample pentest report provided by TCM Security☆1,324Mar 18, 2022Updated 3 years ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010☆1,342Dec 24, 2023Updated 2 years ago
- A collection of tools to perform searches on GitHub.☆1,464Feb 9, 2023Updated 3 years ago
- A tool for checking if MFA is enabled on multiple Microsoft Services☆1,631Mar 4, 2025Updated 11 months ago
- ☆2,313Dec 8, 2023Updated 2 years ago
- Cybersecurity oriented awesome list☆3,044Feb 8, 2026Updated last week
- ☆2,711Aug 7, 2024Updated last year
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,729Dec 18, 2021Updated 4 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,206Aug 7, 2025Updated 6 months ago
- From the team behind Gatsby, Mastra is a framework for building AI-powered applications and agents with a modern TypeScript stack.☆21,029Updated this week
- A collaborative, multi-platform, red teaming framework☆4,296Feb 10, 2026Updated last week
- Top disclosed reports from HackerOne☆5,297Jan 31, 2026Updated 2 weeks ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,203Jan 31, 2026Updated 2 weeks ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,539Aug 6, 2023Updated 2 years ago
- Monitor linux processes without root permissions☆5,871Jan 17, 2023Updated 3 years ago
- Defeating Windows User Account Control☆7,366Jan 11, 2026Updated last month