cr0hn / ja-shortenerLinks
Just Another URL Shortener
☆42Updated last month
Alternatives and similar repositories for ja-shortener
Users that are interested in ja-shortener are comparing it to the libraries listed below
Sorting:
- ☆117Updated 4 years ago
- Guía definitiva para Windows Subsystem for Linux☆211Updated 5 months ago
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆188Updated last week
- BlackRecon is an automated reconnaissance tool designed for ethical hacking and security assessments. It enumerates subdomains, resolves …☆16Updated 5 months ago
- A collection of tools to improve your containerized apps security posture☆148Updated last year
- Máquina virtual educativa que simula los sistemas usados por una empresa eléctrica: control de consumo, monitoreo industrial y cibersegur…☆45Updated last month
- OWASP EKS Goat is a deliberately vulnerable EKS cluster environment to explore AWS cloud-native security through hands-on attack and defe…☆31Updated 2 months ago
- Guia de estudio de preparacion para la certificación LPCI-1☆60Updated 5 years ago
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆29Updated last year
- Herramientas, máquinas y recursos para enfrentarte al OSCP☆55Updated 3 years ago
- ¿Sospechas que un archivo podría contener información oculta o maliciosa? Ésta herramienta de análisis avanzado escanea PDFs, documentos …☆18Updated 5 months ago
- Python script to analyze and extract all Security Groups information☆44Updated 3 months ago
- This project is a Terraform-based implementation for deploying a Security Operations Center (SOC) using Kali Linux in AWS. It provides an…☆117Updated 10 months ago
- OriON is a virtual machine in Spanish that incorporates several tools for Open Source Intelligence (OSINT) on people.☆168Updated 5 months ago
- ☆44Updated last month
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆173Updated 8 months ago
- A comprehensive automation script for penetration testing and reconnaissance.☆42Updated last year
- Create your own certification authority with server certificates in a full automated way☆28Updated 3 weeks ago
- Red Teaming for AI and Cloud☆197Updated 3 months ago
- ☆97Updated last month
- wp-config-scan☆80Updated 2 years ago
- Automatic multiprocess Linux CLI tool that aims for a quick enumeration wrapping pentesting tools.☆12Updated 2 weeks ago
- workshop about cloud-native security☆71Updated 3 years ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆236Updated last year
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆90Updated last month
- Effortlessly check your Cloud Kubernetes cluster's version and conveniently connect with all your clusters in just one click by utilizing…☆41Updated 2 months ago
- A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integration☆330Updated this week
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- Herramienta para hacking wifi con múltiples opciones.☆41Updated last year
- This script is designed to analyze network traffic captured in a .pcap file using the pyshark library. // Este script está diseñado para …☆10Updated 7 months ago