Repository for all the workshop content delivered at nullcon X on 1st of March 2019
☆80Apr 4, 2019Updated 6 years ago
Alternatives and similar repositories for using-docker-kubernetes-for-automating-appsec-and-osint-workflows
Users that are interested in using-docker-kubernetes-for-automating-appsec-and-osint-workflows are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repo contains workshop material delivered at #nullcon2020☆16Mar 6, 2020Updated 6 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 9 years ago
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands …☆950Nov 26, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆15Dec 3, 2017Updated 8 years ago
- This is a web application fuzzer scanner - the goal was CLI flexibility and rapid prototyping☆48Nov 12, 2019Updated 6 years ago
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Nov 17, 2018Updated 7 years ago
- Simple multi threaded tool to extract domain related data from commoncrawl.org☆31Jul 17, 2018Updated 7 years ago
- Burp Suite extension for parsing Swagger web service definition files☆19Jul 15, 2025Updated 8 months ago
- Pentest/BugBounty progress control with scanning modules☆281Jul 16, 2020Updated 5 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Jul 20, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆14Jun 7, 2017Updated 8 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Dec 7, 2016Updated 9 years ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- A Burp extension to show the Collaborator client in a tab☆24Dec 23, 2022Updated 3 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtu…☆628Feb 5, 2019Updated 7 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Jan 9, 2018Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Files used for various testing methodologies.☆12Mar 16, 2026Updated last week
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆59Feb 2, 2019Updated 7 years ago
- Actarus is a custom tool for bug bounty☆77Nov 14, 2019Updated 6 years ago
- Notes as I learn basic AWS penetration testing☆67May 28, 2019Updated 6 years ago
- Real Time Threat Monitoring Tool☆115Nov 16, 2022Updated 3 years ago
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS wea…☆174Mar 1, 2019Updated 7 years ago
- Packer and vagrant scripts to automate building Windows and Linux machines on vCenter☆17Jul 7, 2019Updated 6 years ago
- This tool helps you pentest THE PAST of a website.☆15Jul 13, 2025Updated 8 months ago
- An intercepting proxy, based on Netty☆19Sep 14, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- CVE-2018-3191 反弹shell☆16Oct 23, 2018Updated 7 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆265Nov 18, 2021Updated 4 years ago
- Vagrant file and scripting for easy, disposable Kali Linux virtualization☆23Nov 8, 2019Updated 6 years ago
- ☆27Feb 19, 2026Updated last month
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆206Feb 15, 2024Updated 2 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 7 years ago