appsecco / using-docker-kubernetes-for-automating-appsec-and-osint-workflowsView external linksLinks
Repository for all the workshop content delivered at nullcon X on 1st of March 2019
☆80Apr 4, 2019Updated 6 years ago
Alternatives and similar repositories for using-docker-kubernetes-for-automating-appsec-and-osint-workflows
Users that are interested in using-docker-kubernetes-for-automating-appsec-and-osint-workflows are comparing it to the libraries listed below
Sorting:
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- This repo contains workshop material delivered at #nullcon2020☆16Mar 6, 2020Updated 5 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆15Dec 3, 2017Updated 8 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands …☆949Nov 26, 2022Updated 3 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Dec 7, 2016Updated 9 years ago
- ☆14Jun 7, 2017Updated 8 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 9 years ago
- Burp Suite extension for parsing Swagger web service definition files☆19Jul 15, 2025Updated 7 months ago
- Simple multi threaded tool to extract domain related data from commoncrawl.org☆31Jul 17, 2018Updated 7 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Jul 20, 2022Updated 3 years ago
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Pentest/BugBounty progress control with scanning modules☆281Jul 16, 2020Updated 5 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Dec 11, 2022Updated 3 years ago
- This is a web application fuzzer scanner - the goal was CLI flexibility and rapid prototyping☆48Nov 12, 2019Updated 6 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Free Email Providers☆11Aug 15, 2023Updated 2 years ago
- Notes as I learn basic AWS penetration testing☆67May 28, 2019Updated 6 years ago
- A Burp extension to show the Collaborator client in a tab☆24Dec 23, 2022Updated 3 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Nov 17, 2018Updated 7 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- This tool helps you pentest THE PAST of a website.☆15Jul 13, 2025Updated 7 months ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆110Dec 17, 2023Updated 2 years ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtu…☆631Feb 5, 2019Updated 7 years ago
- Actarus is a custom tool for bug bounty☆77Nov 14, 2019Updated 6 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Jan 9, 2018Updated 8 years ago
- Docker + Travis-CI + Cron + JohnTheRipper(Jumbo) = Bleeding edge builds☆17Mar 7, 2018Updated 7 years ago
- ☆27Oct 1, 2025Updated 4 months ago
- Ansible role to configure redirectors for red team C2☆30Nov 12, 2018Updated 7 years ago
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS wea…☆174Mar 1, 2019Updated 6 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆67May 9, 2022Updated 3 years ago
- PowerView menu for Cobalt Strike☆70Mar 22, 2018Updated 7 years ago