cr0hn / rsm
Redis Security Map - Anti-hacking for Redis
☆31Updated 3 years ago
Alternatives and similar repositories for rsm:
Users that are interested in rsm are comparing it to the libraries listed below
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- A Go client for crobat☆24Updated 5 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 7 years ago
- ☆25Updated 3 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 4 years ago
- Python tool for large scale git analysis. Inspired by gitrob.☆20Updated 4 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- Ansible scripts to build an attack box☆22Updated 6 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- WStalker: an easy proxy☆25Updated 4 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Updated 4 years ago
- ☆38Updated 4 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- various slides and presentations I've worked on☆18Updated last month
- Tools for auditing WAFS☆19Updated 3 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆25Updated last year
- This script accept a text file and collect any IP address (based on its format x.x.x.x) and check if it is one of Tor exit nodes☆9Updated 4 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 2 months ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆16Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- This Burp Suite extension enables the generation of shareable links to specific requests which other Burp Suite users can import.☆12Updated 2 years ago
- My python3 implementation of a Forward Shell☆35Updated 6 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago