MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeover.
☆11Jun 14, 2023Updated 2 years ago
Alternatives and similar repositories for mastko
Users that are interested in mastko are comparing it to the libraries listed below
Sorting:
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- Blank methodology sheet for the OSWE exam☆13Dec 17, 2021Updated 4 years ago
- Mirror of Apache Airavata PHP Gateway☆20Apr 16, 2023Updated 2 years ago
- ☆14Jun 26, 2019Updated 6 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- ☆12Aug 17, 2017Updated 8 years ago
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Dec 9, 2019Updated 6 years ago
- XServer accepts student code submissions from the LMS and runs the code using (separate) courseware graders☆73Jan 18, 2021Updated 5 years ago
- ☆11Apr 21, 2022Updated 3 years ago
- Updated fork of XSStrike: The most advanced XSS scanner.☆24Feb 14, 2023Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- A sample app that uses Fx dependency injection framework.☆20Jun 11, 2020Updated 5 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Copy Breadcrumbs plugin for Visual Studio Code. Based on Scott Blair's extension.☆13Feb 3, 2025Updated last year
- Repository for Ludus french templates☆23Mar 1, 2026Updated 2 weeks ago
- CVE-2021-40438 exploit PoC with Docker setup.☆12Oct 24, 2021Updated 4 years ago
- BloodHound Automation: Collection, Analysis and Data Import☆19Nov 12, 2025Updated 4 months ago
- Create Terraform files using Python scripts.☆10Feb 5, 2022Updated 4 years ago
- File system enumerator and monitor for Android and Ubuntu.☆17Sep 25, 2021Updated 4 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆41Apr 10, 2023Updated 2 years ago
- ☆42Feb 26, 2026Updated 3 weeks ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated 11 months ago
- Simplifying RAG with PostgreSQL and PGVector☆16Jul 31, 2024Updated last year
- Return domains in CSP headers in http response☆16Aug 17, 2021Updated 4 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- PPID Spoofing☆19Dec 26, 2020Updated 5 years ago
- hacking tools☆14Jan 29, 2023Updated 3 years ago
- ☆15Dec 15, 2020Updated 5 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- An attempt at making an automated online judge☆32Oct 9, 2009Updated 16 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆44Dec 26, 2020Updated 5 years ago
- Extension to log postMessage()☆15Feb 17, 2026Updated last month
- Web Scraping to download books of the section "programming" from o'reilly free books☆24Jul 22, 2017Updated 8 years ago
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- ☆11Aug 18, 2023Updated 2 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- BoltWire v6.03 vulnerable to "Improper Access Control"☆13Oct 31, 2023Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year