cr0hn / rsm
Redis Security Map - Anti-hacking for Redis
☆32Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for rsm
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 7 years ago
- Zone transfers for rwhois☆20Updated 5 years ago
- ☆25Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 2 years ago
- DNS server limitation mapper☆25Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆62Updated 5 years ago
- A Go client for crobat☆23Updated 4 years ago
- Docker auditing and enumeration script.☆22Updated 5 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆20Updated last year
- Python tool for large scale git analysis. Inspired by gitrob.☆20Updated 4 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 7 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆74Updated 2 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 2 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- WStalker: an easy proxy☆25Updated 4 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 7 years ago
- Pivot into private VPC networks using a VPN connection☆41Updated 5 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- A CLI tool for querying passive DNS services☆41Updated 10 months ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆36Updated 3 months ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated last year
- An Evil OIDC Server☆51Updated 2 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 5 years ago
- Tools for auditing WAFS☆18Updated 2 years ago