A tool for secrets management, encryption as a service, and privileged access management
☆12Jul 17, 2025Updated 8 months ago
Alternatives and similar repositories for vault-backdoored
Users that are interested in vault-backdoored are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pentester-focused Docker registry tool to enumerate and pull images☆36Oct 19, 2025Updated 5 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆38Aug 8, 2025Updated 7 months ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆52Mar 3, 2025Updated last year
- ☆12Mar 31, 2021Updated 4 years ago
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 10 months ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Feb 15, 2024Updated 2 years ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- etcd-k8s-extract takes in an etcd data directory or db file used in kubernetes, extracts the kubernetes resources and then writes the res…☆39Jan 4, 2025Updated last year
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆14Jan 24, 2025Updated last year
- A React Based Kubernetes YAML Manifest Sanity Checker☆11Mar 3, 2025Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- 10 Gbit/s flexible and extensible Ethernet FPGA-based traffic generator☆11Oct 3, 2014Updated 11 years ago
- Examples of various Entra ID scenarios in Terraform☆17Sep 24, 2024Updated last year
- ☆49Apr 9, 2025Updated 11 months ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆41Dec 2, 2025Updated 3 months ago
- ☆14Mar 6, 2023Updated 3 years ago
- An example Windows 10 UMDF driver for the sole purpose of sending MMIO to BAR regions of an FPGA☆21May 4, 2018Updated 7 years ago
- Slides from various conferences and talks I've given☆14Oct 12, 2025Updated 5 months ago
- Hi, these are some scripts that i use whenever a mobile pentest task comes up . Hope they would be helpful for someone☆13Dec 14, 2023Updated 2 years ago
- Polar is a secure and scalable knowledge graph framework, designed to address the challenges posed by building big data systems in highly…☆21Mar 18, 2026Updated last week
- Holds the public Hacking the Cloud CTFs.☆63Feb 28, 2024Updated 2 years ago
- OPA policies for securing Docker API☆11Aug 14, 2023Updated 2 years ago
- ☆19Sep 9, 2025Updated 6 months ago
- A Simple JS code to keylogger data and send it to the personal server☆31Dec 30, 2024Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Aug 5, 2022Updated 3 years ago
- Parseltongue is a powerful prompt hacking tool/browser extension for real-time tokenization visualization and seamless text conversion, s…☆15Jan 11, 2025Updated last year
- KubeDeck is a suite of open-source tools designed to simplify Kubernetes management. Built with PowerShell and installable via krew, Kube…☆13Apr 25, 2025Updated 10 months ago
- Daniel's weekly report of what he's been up to and might do next!☆19Jan 13, 2023Updated 3 years ago
- native ui for s3☆54Feb 13, 2026Updated last month
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆34Feb 15, 2026Updated last month
- tool for checking potential dependency confusion☆39Jul 5, 2025Updated 8 months ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆37Aug 30, 2018Updated 7 years ago
- ☆33Aug 26, 2025Updated 6 months ago
- ☆43Jul 17, 2025Updated 8 months ago
- Books for hacker in reverse engineering☆34Jul 4, 2023Updated 2 years ago
- Find what egress ports are allowed☆46Nov 19, 2025Updated 4 months ago
- A PoC for CVE-2022-2588 that triggers a WARNING☆10Sep 28, 2022Updated 3 years ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated last year
- A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeratio…☆19Oct 28, 2023Updated 2 years ago