dibsy / Recipies-Of-A-Jenkins-Hacker
Jenkins Security Research
☆11Updated last month
Alternatives and similar repositories for Recipies-Of-A-Jenkins-Hacker:
Users that are interested in Recipies-Of-A-Jenkins-Hacker are comparing it to the libraries listed below
- Enumerate AWS permissions and resources.☆66Updated 2 years ago
- ☆20Updated last year
- ☆15Updated 3 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆85Updated 7 months ago
- ☆32Updated last month
- ☆39Updated 7 months ago
- ☆90Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆68Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆62Updated 4 months ago
- ☆58Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆64Updated 4 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- ☆16Updated 2 years ago
- ☆27Updated last year
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 4 years ago
- A list of "secrets" from JWT sample code and readme files.☆53Updated 4 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Updated 3 years ago
- ☆37Updated 3 years ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆28Updated this week
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆27Updated last year
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆72Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆63Updated last year
- GCP cloud security CTF☆42Updated 10 months ago
- ☆26Updated 2 years ago
- Virtual Security Operations Center☆50Updated last year
- ElasticSearch exploit and Pentesting guide for penetration tester☆24Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆67Updated 2 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆123Updated 9 months ago
- ☆23Updated 5 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago