grafana / bugbounty
Grafana Labs bug bounty
☆29Updated last month
Related projects ⓘ
Alternatives and complementary repositories for bugbounty
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆167Updated last year
- ☆31Updated last year
- a tool to audit the istio service mesh☆173Updated 3 years ago
- WAF bypass PoC☆43Updated last year
- ☆12Updated 2 years ago
- ☆91Updated 6 months ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆51Updated 2 months ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆53Updated 2 months ago
- Runtime security plug to protect user containers☆65Updated this week
- List all public repositories for (valid) GitHub usernames☆68Updated last year
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆30Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated 3 months ago
- ☆14Updated last year
- Mapping from bug bounty and vulnerability disclosure programs to respective GitHub organizations☆52Updated last week
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆54Updated last year
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆110Updated last year
- ☆15Updated 4 months ago
- Cloud agnostic IAM permissions enumerator☆139Updated 2 months ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 6 months ago
- This repository contain any information that can be used to hack Kubernetes☆100Updated 2 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆160Updated last year
- Measures the effectiveness of your Web Application Firewall (WAF)☆76Updated last year
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆27Updated last year
- Monitoring the Cloud Landscape☆74Updated this week
- Additional active scan checks for BURP☆20Updated last month
- ☆40Updated last month
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆59Updated 8 months ago
- Protect against subdomain takeover☆92Updated 5 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 2 months ago
- ☆24Updated 6 months ago