cr0hn / rsmLinks
Redis Security Map - Anti-hacking for Redis
☆31Updated 3 years ago
Alternatives and similar repositories for rsm
Users that are interested in rsm are comparing it to the libraries listed below
Sorting:
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- ☆25Updated 4 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- Pivot into private VPC networks using a VPN connection☆43Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Burp Extension for AWS Signing☆89Updated 10 months ago
- Tools for auditing WAFS☆19Updated 3 years ago
- Python tool for large scale git analysis. Inspired by gitrob.☆20Updated 5 years ago
- Drupal Honeypot☆57Updated 6 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆17Updated 6 years ago
- Simple reverse shell over Slack☆55Updated 4 years ago
- An AWS Lambda vulnerable application written in flask.☆50Updated 8 years ago
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 8 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Updated 5 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- ☆38Updated 5 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- Docker auditing and enumeration script.☆22Updated 6 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 3 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- A Go client for crobat☆24Updated 5 years ago
- OAuth Security Cheatsheet☆40Updated 11 years ago
- Unofficial api for cve.mitre.org☆40Updated 4 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated last month