☆27Feb 19, 2026Updated 2 weeks ago
Alternatives and similar repositories for cmd_and_kubectl_demos
Users that are interested in cmd_and_kubectl_demos are comparing it to the libraries listed below
Sorting:
- ☆25Jul 5, 2018Updated 7 years ago
- ☆29Jan 31, 2025Updated last year
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆30Aug 6, 2014Updated 11 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆79Mar 23, 2020Updated 5 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 6 years ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated last month
- Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server☆15Feb 4, 2021Updated 5 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago
- docker image with useful network and container tools and SSH☆68Nov 25, 2024Updated last year
- GCP cloud security CTF☆47Jun 25, 2025Updated 8 months ago
- Artwork for all official ZAP swag - posters, stickers, t-shirts etc☆14Mar 7, 2024Updated 2 years ago
- ☆29Jul 24, 2025Updated 7 months ago
- Git clone all of a user's PUBLIC Github repositories☆22Oct 8, 2022Updated 3 years ago
- Packer and vagrant scripts to automate building Windows and Linux machines on vCenter☆17Jul 7, 2019Updated 6 years ago
- ☆17Jan 3, 2021Updated 5 years ago
- Simple tool that allows you to detect imposter commits in GitHub Actions workflows.☆26Dec 17, 2024Updated last year
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Jun 14, 2023Updated 2 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Apr 4, 2019Updated 6 years ago
- ☆21Dec 1, 2019Updated 6 years ago
- ☆25Jun 27, 2024Updated last year
- This repository contains examples of Kyverno policies for controlling the creation of Cilium Network policies☆22Nov 2, 2023Updated 2 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Jul 20, 2022Updated 3 years ago
- ☆50Nov 14, 2025Updated 3 months ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆57Feb 12, 2022Updated 4 years ago
- ☆49Mar 21, 2023Updated 2 years ago
- Reverse engineers GQL Schema and generates template payloads☆46Apr 5, 2019Updated 6 years ago
- Timeinator is an extension for Burp Suite that can be used to perform timing attacks over an unreliable network such as the internet.☆22May 9, 2023Updated 2 years ago
- ☆21Sep 25, 2018Updated 7 years ago
- AMF Plugin for JMeter☆37May 24, 2012Updated 13 years ago
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆20Jan 24, 2021Updated 5 years ago
- Everything Application Security☆27Updated this week
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago