antitree / go-pillage-registriesView external linksLinks
Pentester-focused Docker registry tool to enumerate and pull images
☆36Oct 19, 2025Updated 3 months ago
Alternatives and similar repositories for go-pillage-registries
Users that are interested in go-pillage-registries are comparing it to the libraries listed below
Sorting:
- A tool for secrets management, encryption as a service, and privileged access management☆13Jul 17, 2025Updated 7 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 6 months ago
- Various things to share☆11Sep 22, 2018Updated 7 years ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆61Jan 25, 2025Updated last year
- Decrypt encrypted SonicOSX firmware images☆20Feb 24, 2025Updated 11 months ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆171Jan 9, 2026Updated last month
- docker env for ios research on a mac host☆27Jun 12, 2025Updated 8 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated 10 months ago
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 10 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 10 months ago
- ☆86Feb 4, 2026Updated last week
- ☆24Oct 18, 2022Updated 3 years ago
- Putting a leash on naughty AWS permissions☆134Sep 5, 2025Updated 5 months ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆51Mar 3, 2025Updated 11 months ago
- Generate CodeQL taint-tracking models for Go (along with tests) in a graphical UI☆20May 5, 2023Updated 2 years ago
- This repository contains a sample Java application vulnerable to command injection and server-side request forgery (SSRF).☆21Mar 7, 2025Updated 11 months ago
- ☆49Apr 9, 2025Updated 10 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 10 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- CrlfiX☆21Jan 30, 2025Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Aug 5, 2022Updated 3 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆62Aug 26, 2025Updated 5 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆24May 1, 2025Updated 9 months ago
- Throw a tag at it and it comes back with a checksum.☆155Feb 9, 2026Updated last week
- A web CTF for training developers in bug hunting and secure coding!☆100Jan 12, 2025Updated last year
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆30Feb 2, 2026Updated 2 weeks ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆165Oct 28, 2025Updated 3 months ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated last year
- Cloud subdomains identification tool☆62Apr 15, 2025Updated 10 months ago
- D2R MapHack☆10Jun 10, 2022Updated 3 years ago
- TuxTape is a DIY toolkit for creating, building, and deploying livepatches for the Linux kernel.☆68May 19, 2025Updated 8 months ago
- Simple C2 using GitHub repository as comms channel.☆32Oct 26, 2024Updated last year
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆75Sep 1, 2025Updated 5 months ago
- ☆28Sep 9, 2024Updated last year
- ☆43Jul 17, 2025Updated 6 months ago
- 🕵️ Email osint tool☆64Aug 23, 2023Updated 2 years ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Mar 26, 2025Updated 10 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆37Aug 8, 2025Updated 6 months ago