☆54Dec 14, 2025Updated 3 months ago
Alternatives and similar repositories for k8s-chaos-engineering
Users that are interested in k8s-chaos-engineering are comparing it to the libraries listed below
Sorting:
- ☆52Feb 10, 2026Updated last month
- A powerful Burp Suite extension that imports Postman collections☆31Aug 1, 2025Updated 7 months ago
- A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities fou…☆83Nov 25, 2025Updated 3 months ago
- Advanced APK analysis tool with intelligent caching, pattern matching, and comprehensive security vulnerability detection☆83Oct 21, 2025Updated 5 months ago
- My notes containing the Certified Red Team Professional Course☆71Sep 7, 2024Updated last year
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆70Jun 5, 2025Updated 9 months ago
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆81Aug 20, 2023Updated 2 years ago
- ☆243Dec 10, 2025Updated 3 months ago
- This repository updates latest Bug Bounty medium writeups every 10 minutes, https://readmedium.com/Medium_URL, https://archive.ph/Medium_…☆160Updated this week
- A list of all Active Directory machines from HackTheBox☆221Mar 2, 2026Updated 2 weeks ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆151Sep 4, 2025Updated 6 months ago
- Python script to decrypt passwords stored by mRemoteNG☆176Jul 6, 2023Updated 2 years ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆150Mar 20, 2024Updated 2 years ago
- A free software to find the components installed in Joomla CMS, built out of the ashes of Joomscan.☆247Aug 1, 2023Updated 2 years ago
- POC exploit for CVE-2024-49138☆267Feb 14, 2025Updated last year
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆657Jan 16, 2026Updated 2 months ago
- Collection of Notes and CheatSheets used for Red teaming Certs☆497Feb 13, 2023Updated 3 years ago
- ☆478Oct 7, 2022Updated 3 years ago
- how to look for Leaked Credentials !☆1,035May 6, 2024Updated last year
- A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.☆744Jun 25, 2021Updated 4 years ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆951May 21, 2025Updated 10 months ago
- A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for id…☆1,784Sep 11, 2025Updated 6 months ago
- Flutter Reverse Engineering Framework☆1,442Apr 11, 2022Updated 3 years ago
- Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)☆1,094Jul 5, 2021Updated 4 years ago
- Burp Suite Certified Practitioner Exam Study☆1,349Mar 12, 2026Updated last week
- A big list of Android Hackerone disclosed reports and other resources.☆1,672Sep 10, 2025Updated 6 months ago
- Mobile Edge-Dynamic Unified Security Analysis☆2,197Mar 11, 2026Updated last week
- ☆2,319Dec 8, 2023Updated 2 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,744Dec 18, 2021Updated 4 years ago
- Cybersecurity oriented awesome list☆3,296Updated this week
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,218Aug 7, 2025Updated 7 months ago
- ☆2,740Aug 7, 2024Updated last year
- Automated Penetration Testing Agentic Framework Powered by Large Language Models☆12,102Feb 23, 2026Updated 3 weeks ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,568Aug 6, 2023Updated 2 years ago
- Top disclosed reports from HackerOne☆5,406Feb 28, 2026Updated 2 weeks ago
- Monitor linux processes without root permissions☆5,927Mar 1, 2026Updated 2 weeks ago
- A curated list of free courses with certifications. Also available at https://free-certifications.com/☆52,767Jul 22, 2025Updated 7 months ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,812Dec 4, 2025Updated 3 months ago
- windows-kernel-exploits Windows平台提权漏洞集合☆8,617Jun 11, 2021Updated 4 years ago