appsecco / defcon-26-workshop-attacking-and-auditing-docker-containersLinks
DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source
☆109Updated 6 years ago
Alternatives and similar repositories for defcon-26-workshop-attacking-and-auditing-docker-containers
Users that are interested in defcon-26-workshop-attacking-and-auditing-docker-containers are comparing it to the libraries listed below
Sorting:
- Jekyll Files for cloudsecwiki.com☆49Updated 4 years ago
- DupeKeyInjector☆135Updated 3 years ago
- ☆103Updated 5 years ago
- Burp Extension for AWS Signing☆90Updated 10 months ago
- HTML5 WebSocket message fuzzer☆148Updated 7 years ago
- vulnerable single sign on☆149Updated last year
- JWT Fuzzer for BurpSuite. Adds an Intruder hook for on-the-fly JWT fuzzing.☆100Updated 6 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- A tool to evaluate Content Security Policies.☆71Updated 5 years ago
- Scans tcl for command injection☆36Updated 6 years ago
- Proof-of-concept CORS exploitation tool.☆35Updated 6 years ago
- ☆43Updated 5 years ago
- Bodhi - Client-side Vulnerability Playground☆121Updated 4 years ago
- Hacking Artifactory with server side template injection☆51Updated 5 years ago
- dns rebind tool with custom scripts☆83Updated 2 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆23Updated 7 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 8 years ago
- Some of my public exploits☆51Updated 5 years ago
- A malicious LDAP server for JNDI injection attacks☆76Updated last year
- ☆48Updated 4 years ago
- Simple Server Side Request Forgery services enumeration tool.☆55Updated 7 years ago
- Full TTY reverse shell over SSH☆59Updated 5 years ago
- ☆38Updated 5 years ago
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆114Updated 6 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆116Updated 5 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆122Updated 6 years ago
- A repository for GraphQL Extension for Burp Suite☆57Updated 7 years ago
- Burp as a Docker Container☆59Updated 5 years ago
- Burp extension☆58Updated 7 years ago