☆53Dec 14, 2025Updated 5 months ago
Alternatives and similar repositories for k8s-chaos-engineering
Users that are interested in k8s-chaos-engineering are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆51Feb 10, 2026Updated 3 months ago
- Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.☆21May 26, 2025Updated 11 months ago
- HackList: Your go-to AI-powered guide to hands-on cybersecurity learning!☆24Jul 6, 2025Updated 10 months ago
- You can gather useful information accounts by username across all types networks ( which also include social media)☆29Oct 19, 2023Updated 2 years ago
- A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities fou…☆90Nov 25, 2025Updated 5 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A list of the best cybersecurity research related blogs.☆33May 26, 2025Updated 11 months ago
- Hands-on Wireshark projects for beginners to learn network analysis and packet inspection.☆103May 30, 2024Updated last year
- My notes containing the Certified Red Team Professional Course☆73Sep 7, 2024Updated last year
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆71Jun 5, 2025Updated 11 months ago
- Save your dorking results to the terminal. A modified version of TomNomNom's amazing tool!☆99Mar 4, 2025Updated last year
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆82Aug 20, 2023Updated 2 years ago
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆85Sep 24, 2024Updated last year
- ☆253Dec 10, 2025Updated 5 months ago
- This repository updates latest Bug Bounty medium writeups every 10 minutes, https://readmedium.com/Medium_URL, https://archive.ph/Medium_…☆169Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A fast, minimalistic scanner for time-based SQL injection (SQLi) detection – built in Go.☆144May 7, 2025Updated last year
- Enumerate / Dump Docker Registry☆183Apr 10, 2024Updated 2 years ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆152Mar 20, 2024Updated 2 years ago
- PNPT Exam Preparation - TCM Security☆171Jul 25, 2021Updated 4 years ago
- Local penetration testing lab using docker-compose.☆211Jun 17, 2025Updated 11 months ago
- POC exploit for CVE-2024-49138☆268Feb 14, 2025Updated last year
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆664Updated this week
- A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure cod…☆723May 5, 2026Updated 2 weeks ago
- ☆490Oct 7, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Web recon script. No need to fear, sumrecon is here!☆400Oct 10, 2022Updated 3 years ago
- ☆779May 7, 2025Updated last year
- Windows AV Evasion☆853Apr 13, 2020Updated 6 years ago
- The useful exploit finder☆824Jan 19, 2026Updated 4 months ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆969May 21, 2025Updated last year
- 🔍 An OSINT tool for discovering linked social accounts and associated emails across multiple platforms using a single username.☆947Feb 28, 2026Updated 2 months ago
- A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for id…☆1,808Sep 11, 2025Updated 8 months ago
- Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop☆1,273Nov 2, 2022Updated 3 years ago
- A collection of tools to perform searches on GitHub.☆1,490Feb 9, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A big list of Android Hackerone disclosed reports and other resources.☆1,687Sep 10, 2025Updated 8 months ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆2,005Oct 10, 2018Updated 7 years ago
- ☆2,326Dec 8, 2023Updated 2 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,779Dec 18, 2021Updated 4 years ago
- Cybersecurity oriented awesome list☆3,688Updated this week
- ☆2,793Aug 7, 2024Updated last year
- A collection of snippets of codes and commands to make your life easier!☆2,902Sep 25, 2023Updated 2 years ago