krol3 / demo-fileless
☆12Updated 3 months ago
Alternatives and similar repositories for demo-fileless:
Users that are interested in demo-fileless are comparing it to the libraries listed below
- ☆42Updated 9 months ago
- AWS SSO serverless phishing API.☆31Updated 3 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 7 months ago
- ☆15Updated 7 months ago
- ☆12Updated 3 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 6 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- ☆31Updated 2 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆46Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆36Updated 5 months ago
- Determine privileges from cloud credentials via brute-force testing.☆66Updated 6 months ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 3 months ago
- ☆67Updated last month
- GCP GOAT is the vulnerable application for learn the GCP Security☆63Updated last year
- Kubernetes Pwnage for all☆56Updated 4 years ago
- ☆55Updated last year
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated last year
- A beginner-friendly CTF about Kubernetes security.☆77Updated 2 years ago
- Dockerfile Security Checker using OPA Rego policies with Conftest☆59Updated 2 years ago
- ☆58Updated last year
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 7 months ago
- Jenkins Security Research☆11Updated 3 months ago
- ☆10Updated 2 years ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- ☆28Updated 4 years ago
- WAF bypass PoC☆46Updated last year
- a tool to audit the istio service mesh☆173Updated 3 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year