cr0hn / rsm
Redis Security Map - Anti-hacking for Redis
☆32Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for rsm
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 7 years ago
- Python tool for large scale git analysis. Inspired by gitrob.☆20Updated 4 years ago
- ☆25Updated 3 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 7 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Zone transfers for rwhois☆20Updated 5 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆74Updated 2 years ago
- Exploit for win10 SMB3.1☆16Updated 4 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- ☆35Updated 4 years ago
- A Security Scanner for Go☆26Updated 5 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 7 years ago
- Ansible scripts to build an attack box☆22Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- DNS server limitation mapper☆25Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Updated 7 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 7 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 2 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆17Updated 4 years ago
- WStalker: an easy proxy☆25Updated 4 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 5 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated last year
- Docker auditing and enumeration script.☆22Updated 5 years ago