mradamlacey / json-to-es-bulkLinks
Utility to create an Elasticsearch bulk request from JSON data
☆61Updated 8 years ago
Alternatives and similar repositories for json-to-es-bulk
Users that are interested in json-to-es-bulk are comparing it to the libraries listed below
Sorting:
- A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.☆31Updated 8 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 4 years ago
- Script to spider a website and find publicly open S3 buckets☆28Updated 5 years ago
- JWT fuzzer☆107Updated 7 years ago
- A full example report☆11Updated 6 years ago
- AWS S3 Hacks☆78Updated 7 years ago
- ☆15Updated last month
- Dockerized cve-search as a web app☆16Updated 7 years ago
- PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)☆40Updated 6 years ago
- Simulates a logged in user.☆16Updated last year
- Python framework for manipulating bulk WHOIS data from RIRs☆22Updated last month
- The ELK stack Docker containerization (Elasticsearch, Logstash and Kibana)☆21Updated 3 years ago
- Add data in bulk to elasticsearch. It supports data streaming from PostgreSQL or Filesystem☆27Updated last week
- Hunt Open MongoDB instances☆79Updated 6 years ago
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Updated 8 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆41Updated 7 years ago
- Burp as a Docker Container☆59Updated 5 years ago
- Reverse shell container for k8s deployments☆49Updated 5 years ago
- Generate masscan configuration files for lat/long and Areas. Useful for scanning specific areas.☆19Updated 5 years ago
- An extensible, heuristic-based vulnerability scanning tool for installed npm packages☆50Updated 4 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Updated 11 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- Provides a suite of Burp extensions and a maven plugin to automate security tests using BurpSuite.☆24Updated 7 years ago
- NoSQL Injection Demo Application☆13Updated 12 years ago
- Scrapy spider to recursively crawl for TOR hidden services☆11Updated 8 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 7 years ago
- Unofficial WhatCMS API package☆41Updated 4 years ago
- little scripts created during my time as a pentetration tester☆31Updated 13 years ago
- Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container☆32Updated 7 years ago
- Security Research☆94Updated 4 months ago