avizway1 / k8sView external linksLinks
☆32Jan 29, 2026Updated 2 weeks ago
Alternatives and similar repositories for k8s
Users that are interested in k8s are comparing it to the libraries listed below
Sorting:
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- The OWASP Amass Homebrew Formula☆16Jul 13, 2025Updated 7 months ago
- ☆13Jul 19, 2017Updated 8 years ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bucrowd LevelUp 2017 virtua…☆25Jul 15, 2017Updated 8 years ago
- Now use your favorite Google Dorks techniques to find vulnerabilities and earn Bounties.☆31Oct 1, 2020Updated 5 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids.☆32Jul 1, 2018Updated 7 years ago
- In-depth DNS Enumeration and Network Mapping☆36Mar 10, 2019Updated 6 years ago
- Varna: Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL)☆52Dec 26, 2022Updated 3 years ago
- Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Clo…☆132Nov 16, 2025Updated 2 months ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆114Jul 21, 2017Updated 8 years ago
- Instructions tracing powered by frida☆182Jul 8, 2019Updated 6 years ago
- Yet another subdomain finder☆209Jan 20, 2020Updated 6 years ago
- Identity & Access Management simplified and secure.☆260Mar 6, 2023Updated 2 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆349Jul 20, 2020Updated 5 years ago
- TotalRecon installs all the recon tools you need☆465Jul 3, 2020Updated 5 years ago
- Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.☆554Jul 13, 2025Updated 7 months ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆610Aug 15, 2025Updated 6 months ago
- Password spraying using AWS Lambda for IP rotation☆658Feb 14, 2023Updated 3 years ago
- Security Remediation Guides☆745Nov 24, 2025Updated 2 months ago
- ☆834Nov 13, 2023Updated 2 years ago
- SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS☆905Dec 17, 2024Updated last year
- A graph-based tool for visualizing effective access and resource relationships in AWS environments.☆994Oct 4, 2022Updated 3 years ago
- Awesome cloud enumerator☆1,092Mar 9, 2025Updated 11 months ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,129Dec 16, 2024Updated last year
- Making Favicon.ico based Recon Great again !☆1,261Aug 29, 2023Updated 2 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,308Nov 22, 2022Updated 3 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,295Dec 23, 2018Updated 7 years ago
- Subdomain enumeration and information gathering tool☆1,359Jul 23, 2025Updated 6 months ago
- Penetration Testing Platform☆1,350Jul 6, 2022Updated 3 years ago
- Cloudflare, Sucuri, Incapsula real IP tracker.☆1,763Jul 25, 2023Updated 2 years ago
- Security Tool to Look For Interesting Files in S3 Buckets☆1,456Apr 10, 2024Updated last year
- A default credential scanner.☆1,503Jul 8, 2025Updated 7 months ago
- MassDNS wrapper written in go to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard filtering…☆1,588Updated this week
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,628Aug 6, 2022Updated 3 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,648Nov 24, 2020Updated 5 years ago
- 服务端配置错误情况下用于伪造ip地址进行测试的Burp Suite插件☆1,640Sep 29, 2022Updated 3 years ago
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆1,969Sep 5, 2021Updated 4 years ago
- A wrapper around grep, to help you grep for things☆2,075Jun 8, 2024Updated last year
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆2,059Jan 2, 2024Updated 2 years ago