dibsy / Recipies-Of-A-Jenkins-HackerLinks
Jenkins Security Research or Hacking Jenkins ;)
☆11Updated 5 months ago
Alternatives and similar repositories for Recipies-Of-A-Jenkins-Hacker
Users that are interested in Recipies-Of-A-Jenkins-Hacker are comparing it to the libraries listed below
Sorting:
- Enumerate AWS permissions and resources.☆69Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated 9 months ago
- ☆35Updated 2 months ago
- GCP cloud security CTF☆45Updated last month
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆63Updated 8 months ago
- ☆57Updated 2 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆91Updated last year
- ☆47Updated 11 months ago
- This script is a multi-threaded Okta password sprayer.☆70Updated last year
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 5 years ago
- ☆21Updated 2 years ago
- ☆12Updated 2 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- ☆90Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- ☆17Updated 2 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- Custom queries list for BloodHound☆28Updated 9 months ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆75Updated last month
- ElasticSearch exploit and Pentesting guide for penetration tester☆27Updated 2 years ago
- ☆15Updated last year
- ☆27Updated 2 years ago
- An Evil OIDC Server☆53Updated 2 years ago
- Posts about different topics☆36Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆35Updated last month