Cloud security projects with Spring Cloud Config Server and Vault
☆29Mar 14, 2026Updated last week
Alternatives and similar repositories for CloudSecurity
Users that are interested in CloudSecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Java web and command line applications demonstrating various security topics☆239Updated this week
- Java-Web-Security - Sichere Webanwendungen mit Java entwickeln☆221Mar 16, 2026Updated last week
- ☆11Nov 12, 2019Updated 6 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- Decentralized web archiving☆20Aug 7, 2018Updated 7 years ago
- Jboss_JMXInvokerServlet_Deserialization_RCE☆21Sep 3, 2019Updated 6 years ago
- 扫描常见未授权访问(改)(redis、mongodb、memcached、elasticsearch、zookeeper、ftp、CouchDB、docker、Hadoop)☆15Aug 4, 2020Updated 5 years ago
- ☆22Jul 12, 2024Updated last year
- ☆11Mar 30, 2017Updated 8 years ago
- Creating a vulnerable environment and the PoC☆15Nov 25, 2019Updated 6 years ago
- This Repository contains the stable beta preview of the next major secureCodeBox (SCB) release v2.0.0.☆23Oct 14, 2020Updated 5 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆12May 14, 2016Updated 9 years ago
- 在JustTrustMe的基础上修改了log日志打印位置,便于追踪hook函数☆30Jul 15, 2019Updated 6 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Jan 22, 2018Updated 8 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- SpringBoot_Actuator_RCE☆95May 26, 2020Updated 5 years ago
- Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy …☆12Sep 18, 2020Updated 5 years ago
- Dump elasticsearch instance☆15Jan 7, 2026Updated 2 months ago
- CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4☆68Feb 3, 2020Updated 6 years ago
- ☆10Apr 13, 2021Updated 4 years ago
- 开源!自主设计的badusb电路板☆10Mar 26, 2021Updated 4 years ago
- German translation of the Microsoft Elevation of Privilege card game along with notes and examples☆10Jan 9, 2016Updated 10 years ago
- AWS managed IAM policies☆16Mar 24, 2022Updated 4 years ago
- ☆11May 28, 2019Updated 6 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 7 years ago
- A simple Script which tests for LFI (Local File Inclusion) via Curl☆15Mar 11, 2019Updated 7 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- ☆12Jan 13, 2018Updated 8 years ago
- This repo contains the published reports☆11Dec 12, 2025Updated 3 months ago
- 利用agent hock指定的class,在jar运行周期内,用于跟踪被执行的方法,辅助做一些事情,比如挖洞啊☆125Jul 17, 2020Updated 5 years ago
- a Burp Extender that add an random X-Forward-For IP address for each request☆31Aug 12, 2016Updated 9 years ago
- https://Wh0ale.github.io☆10Dec 4, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/lfimap☆16Mar 5, 2016Updated 10 years ago
- Reconnaissance test in Kubernetes clusters☆21Oct 19, 2018Updated 7 years ago
- ExtractSubdomainFromFDNS, updating☆33Sep 5, 2019Updated 6 years ago
- A Collection of all things Security☆11Sep 24, 2020Updated 5 years ago