mauilion / blackhat-2019View external linksLinks
☆51May 19, 2020Updated 5 years ago
Alternatives and similar repositories for blackhat-2019
Users that are interested in blackhat-2019 are comparing it to the libraries listed below
Sorting:
- ☆12May 2, 2023Updated 2 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆102Sep 10, 2019Updated 6 years ago
- ☆29Jan 31, 2025Updated last year
- Scripts to demonstrate VPC Service Controls between tenant and shared projects☆12Jun 11, 2019Updated 6 years ago
- ☆14Dec 7, 2022Updated 3 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- An OPA library to develop IT Control policies, for the IBM Cloud☆17Sep 26, 2022Updated 3 years ago
- Kubernetes Common Configuration Scoring System☆121Jul 10, 2022Updated 3 years ago
- ☆17Jan 23, 2021Updated 5 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Say thank you to everyone who takes the time to create and discus or a pull request in your Github repository, using Azure Functions☆17Jan 22, 2022Updated 4 years ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Mar 9, 2015Updated 10 years ago
- ☆21Nov 30, 2019Updated 6 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Tiny Calculator with support of +, -, *, /, ^, sin, cos, tan...☆10Apr 2, 2024Updated last year
- ZAP Management Scripts☆23Jan 1, 2026Updated last month
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- CTF Writeups☆26Oct 6, 2019Updated 6 years ago
- Web application that convert docker-compose files to kubernetes files☆26Dec 11, 2022Updated 3 years ago
- Owasp Zap chart for Kubernetes☆50Feb 9, 2022Updated 4 years ago
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22May 24, 2019Updated 6 years ago
- Different code-injections techniques under a common tool☆30May 3, 2020Updated 5 years ago
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 5 years ago
- Terraform module for building base networking in AWS☆25Oct 21, 2025Updated 3 months ago
- ☆27Oct 1, 2025Updated 4 months ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- (WIP) A terraform / kitchen-terraform hardening baseline for the cis-aws-foundations-baseline☆24Dec 14, 2025Updated 2 months ago
- ☆28Aug 6, 2020Updated 5 years ago
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- ☆27Aug 31, 2022Updated 3 years ago
- Jenkins Plugin for Sysdig Secure☆14Jan 7, 2026Updated last month
- Jenkins plugin that adds Anchore container image analysis and policy evaluation to Jenkins as a build step☆30Dec 20, 2024Updated last year
- Labs for Threat Modelling training delivered by ControlPlane☆35Apr 24, 2024Updated last year
- CVE-2020-2021☆22Oct 12, 2020Updated 5 years ago
- Variety of kubectl krew tools usually security focused☆34Jul 17, 2025Updated 6 months ago
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆211Aug 18, 2021Updated 4 years ago