☆27Feb 19, 2026Updated 2 months ago
Alternatives and similar repositories for cmd_and_kubectl_demos
Users that are interested in cmd_and_kubectl_demos are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 7 years ago
- A list of checks with tips for analyzing the security of Android applications☆14Nov 19, 2019Updated 6 years ago
- ☆29Jan 31, 2025Updated last year
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆30Aug 6, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆25Jul 5, 2018Updated 7 years ago
- Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)☆11Jan 22, 2025Updated last year
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- Git clone all of a user's PUBLIC Github repositories☆22Oct 8, 2022Updated 3 years ago
- Common Wordlists☆58Aug 26, 2016Updated 9 years ago
- Artwork for all official ZAP swag - posters, stickers, t-shirts etc☆14Mar 7, 2024Updated 2 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆78Mar 23, 2020Updated 6 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Apr 4, 2019Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Darkbit Cloud Security Tools☆25Nov 12, 2020Updated 5 years ago
- Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server☆15Feb 4, 2021Updated 5 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- This repository contains examples of Kyverno policies for controlling the creation of Cilium Network policies☆22Nov 2, 2023Updated 2 years ago
- PoC for CVE-2018-1002105.☆222Dec 21, 2018Updated 7 years ago
- ☆19Mar 27, 2020Updated 6 years ago
- ☆21Sep 25, 2018Updated 7 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A library to assist in security-testing Unicode enabled applications during fuzzing, XSS, SQLi, etc.☆42Jul 1, 2017Updated 8 years ago
- Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support☆119Apr 14, 2026Updated 3 weeks ago
- ☆18Apr 7, 2022Updated 4 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Jul 20, 2022Updated 3 years ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆16Jan 25, 2026Updated 3 months ago
- Burp Extension for AWS Signing☆92Jan 10, 2025Updated last year
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆20Jan 24, 2021Updated 5 years ago
- CVE-2020-12828 PoC and Analysis.☆28Jun 30, 2020Updated 5 years ago
- Dynamic DNS Update Bruteforce Tool☆29Feb 8, 2017Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Examples of projects using Arduino and ESP8266☆13Oct 6, 2014Updated 11 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- This repository contains some details about abusing outlook.☆27Aug 17, 2018Updated 7 years ago
- GCP cloud security CTF☆49Jun 25, 2025Updated 10 months ago
- Reverse engineers GQL Schema and generates template payloads☆46Apr 5, 2019Updated 7 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- ☆22Aug 3, 2024Updated last year