anshumanbh / hodorLinks
A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes
☆34Updated 8 years ago
Alternatives and similar repositories for hodor
Users that are interested in hodor are comparing it to the libraries listed below
Sorting:
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- badbucket checks your s3 bucket for common misconfigurations☆23Updated 7 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- The knife of the Admin & Security auditor☆42Updated 5 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- Open Security Summit 2018☆29Updated 4 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- A More or less Random Collection of Scripts for security Testing.☆65Updated 3 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Updated 8 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- Exploit insecure crossdomain.xml files.☆26Updated 8 years ago
- Jaqen - Simple DNS rebinding☆72Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Run DependencyCheck Against Your Orgs GitHub Repos.☆14Updated 7 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 8 years ago
- ☆12Updated 8 years ago
- Lair Framework dockerized.☆38Updated 4 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Updated 7 years ago