ekeih / kube-shodanLinks
Register your Kubernetes IPs to monitor.shodan.io
☆18Updated 2 years ago
Alternatives and similar repositories for kube-shodan
Users that are interested in kube-shodan are comparing it to the libraries listed below
Sorting:
- Decryption utility for PGP Whole Disk Encryption☆19Updated 3 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- Notebook collection☆10Updated 6 years ago
- ZAP Management Scripts☆23Updated last month
- egrets monitors egress☆46Updated 5 years ago
- ☆29Updated 5 months ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆111Updated 5 years ago
- vyos based isolation of networks☆10Updated 4 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Updated last week
- Python script for privilege escalation for Python☆11Updated 5 years ago
- Containerized pentesting tools☆45Updated 3 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Updated 4 years ago
- A static website template for security pages.☆52Updated 10 months ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Updated 7 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Updated 8 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated last month
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆56Updated 7 months ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- A local scanner for vulnerable web applications☆39Updated last week
- A wrapper around ripgrep to check for various common patterns.☆13Updated 5 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- A tool to run a command when the target of a symlink changes☆16Updated 9 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago