anshumanbh / hodorLinks
A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes
☆34Updated 8 years ago
Alternatives and similar repositories for hodor
Users that are interested in hodor are comparing it to the libraries listed below
Sorting:
- badbucket checks your s3 bucket for common misconfigurations☆24Updated 8 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- A More or less Random Collection of Scripts for security Testing.☆65Updated 3 years ago
- Exfiltrate files via DNS☆95Updated 11 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform☆165Updated 10 months ago
- ☆12Updated 8 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- ☆78Updated 9 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- A static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a la…☆140Updated last year
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆62Updated 7 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Updated 2 years ago
- A collection of Ansible roles for automating infosec builds.☆93Updated 7 years ago
- ☆67Updated 8 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- Conference talk slides and code☆11Updated 4 years ago
- User, contributor and developer friendly vulnerability database☆128Updated 6 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- Index all certificates from certificate transparancy into Elasticsearch☆22Updated 7 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 8 years ago
- Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps a…☆74Updated 7 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆76Updated last year
- REST API test utility☆22Updated 5 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 5 years ago