☆42Nov 13, 2025Updated 5 months ago
Alternatives and similar repositories for clusterfuck
Users that are interested in clusterfuck are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Aug 10, 2024Updated last year
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- ☆18Feb 2, 2026Updated 2 months ago
- ☆20Nov 6, 2023Updated 2 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- An awesome collection of articles, papers, conferences, guides, and tools relating to deception in cybersecurity.☆91Mar 14, 2026Updated last month
- Halberd : Multi-Cloud Agentic Attack Tool☆335Apr 8, 2026Updated last week
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- ☆21Jan 8, 2026Updated 3 months ago
- Misery Loader to bypass modern EDR solutions☆18Dec 20, 2024Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆63Jan 25, 2025Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆85Apr 7, 2026Updated last week
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆17Jul 27, 2024Updated last year
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆41Apr 1, 2026Updated 2 weeks ago
- ☆26Nov 8, 2024Updated last year
- Repo hacks☆21Dec 7, 2025Updated 4 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆200Updated this week
- ☆53Oct 29, 2024Updated last year
- An official Nomad task driver plugin for sandboxing workloads using native Linux kernel features☆17Mar 20, 2026Updated 3 weeks ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Jan 6, 2022Updated 4 years ago
- Planning and roadmap for future Ecosyste.ms development☆21Jun 20, 2024Updated last year
- Detect drift. Defend cloud.☆36Feb 21, 2026Updated last month
- Local CLI tool for browser extension risk analysis☆29Apr 11, 2025Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆38Jan 25, 2026Updated 2 months ago
- Scan your account for the use of untrusted AMIs☆32Apr 6, 2026Updated last week
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- Supply Chain Security Research - Attack Trees☆10Jan 9, 2023Updated 3 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year