grafana / bugbountyLinks
Grafana Labs bug bounty
☆29Updated 11 months ago
Alternatives and similar repositories for bugbounty
Users that are interested in bugbounty are comparing it to the libraries listed below
Sorting:
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆172Updated 7 months ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆160Updated last year
- ☆102Updated 7 months ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆465Updated last year
- OWASP Kubernetes security and compliance tool [WIP]☆106Updated 2 years ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆119Updated 2 years ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Leaky Vessels Dynamic Detector☆103Updated 5 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆109Updated 8 months ago
- ☆31Updated 2 years ago
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆174Updated this week
- Discover vulnerabilities and container image misconfiguration in production environments.☆56Updated 2 weeks ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆350Updated 5 months ago
- book website☆71Updated 3 years ago
- 🧰 Multi Tool Kubernetes Pentest Image☆246Updated 2 weeks ago
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆156Updated last year
- ☆44Updated 4 months ago
- Tools to assess DNS security.☆152Updated last year
- Runtime security plug to protect user containers☆66Updated last week
- Tool for auditing RBACs in Kubernetes☆223Updated last year
- Cloud agnostic IAM permissions enumerator☆157Updated 5 months ago
- Find secrets in git repositories with TruffleHog & Gitleaks☆52Updated this week
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆189Updated this week
- ☆180Updated 4 months ago
- ☆260Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆105Updated 7 months ago
- Measures the effectiveness of your Web Application Firewall (WAF)☆82Updated 2 months ago
- WAF bypass PoC☆49Updated last year
- Awesome resources about Security in Kubernetes☆44Updated 2 years ago
- Blazing fast GraphQL discovery & fingerprinting toolbox.☆115Updated last year