brompwnie / ed
Ed is a tool used to identify and exploit accessible UNIX Domain Sockets
☆27Updated 5 years ago
Alternatives and similar repositories for ed:
Users that are interested in ed are comparing it to the libraries listed below
- Collection of Slides From My Conference Talks☆20Updated 2 years ago
- Burp with Friends☆100Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 2 years ago
- OAuth 2.0 Dynamic Security Scanner☆31Updated 3 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆105Updated 4 years ago
- ☆58Updated last year
- A CLI tool for leveraging IDP signing keys to impersonate users and groups☆18Updated 3 years ago
- An Evil OIDC Server☆51Updated 2 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆62Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆42Updated 4 years ago
- ☆102Updated 3 months ago
- Apfell Golang macOS/Linux/Windows implant☆88Updated 3 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Kubernetes Pwnage for all☆56Updated 4 years ago
- ☆32Updated 4 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 5 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆75Updated 2 years ago
- ☆27Updated 2 months ago
- ☆36Updated 6 years ago
- Serverless Workshop☆16Updated 2 years ago
- A framework for exploiting padding oracles in network-based applications☆26Updated last year
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated last year
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Updated 4 years ago
- ☆15Updated 2 years ago
- Burp Extension for AWS Signing☆87Updated last week
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆134Updated 3 months ago