PoC for CVE-Requested vulnerability in Amazon ECS (EC2 launch type) allowing cross-task IAM credential theft.
☆47Aug 20, 2025Updated 6 months ago
Alternatives and similar repositories for ecscape
Users that are interested in ecscape are comparing it to the libraries listed below
Sorting:
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆22Jul 31, 2025Updated 7 months ago
- RabbitMQ exploit and Pentesting guide for penetration tester☆20Nov 22, 2023Updated 2 years ago
- A small webserver vulnerable to insecure deserialization☆21Nov 30, 2017Updated 8 years ago
- terraform deployment for red team☆26Dec 13, 2022Updated 3 years ago
- A pattern for reasonably secure Electron applications☆73Feb 4, 2023Updated 3 years ago
- ☆29May 14, 2019Updated 6 years ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- ☆33Feb 27, 2024Updated 2 years ago
- Starter template for vue 3 applications with theme switching, registration, authentication, email verification, and the best 404 Not Foun…☆11Jan 28, 2022Updated 4 years ago
- A collection of helper scripts for migrating existing AWS IAM federation into AWS SSO☆13Aug 30, 2021Updated 4 years ago
- This sample repositories provides an production ready example of enhancing AWS SSO for enterprise usage. We provide an automation for ass…☆16Jul 8, 2025Updated 7 months ago
- ☆10Sep 24, 2021Updated 4 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆14Feb 19, 2023Updated 3 years ago
- ☆12Jul 4, 2024Updated last year
- ☆10Mar 6, 2023Updated 3 years ago
- ☆10Mar 11, 2024Updated last year
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- JavaScript for Automation (JXA) tool to do Active Directory enumeration.☆107Feb 19, 2022Updated 4 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 10 months ago
- Enforce Rust documentation correctness☆14Dec 1, 2022Updated 3 years ago
- Interned string and more for rust☆10Dec 29, 2021Updated 4 years ago
- ☆15Apr 20, 2020Updated 5 years ago
- Breakout Game written in Rust for the ESP32 with an OLED display, using the Embassy framework.☆11Jan 31, 2025Updated last year
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- mdbook on common pitfalls in unsafe rust code☆11May 24, 2019Updated 6 years ago
- XML builder macro letting you write XML inside Rust code☆10Nov 15, 2023Updated 2 years ago
- Examples and support libraries for the amdgpu Rust target☆17Dec 4, 2025Updated 3 months ago
- A C# implementation that disables Windows Firewall bypassing UAC☆17Oct 23, 2024Updated last year
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- The Chinese Version of The Rust Reference☆10Oct 13, 2024Updated last year
- ☆10Mar 24, 2023Updated 2 years ago
- This repository is related to specialized books published by the THB team.☆20Aug 13, 2025Updated 6 months ago
- Support for compiling C programs with Eyra☆15Oct 13, 2024Updated last year
- Visualize an Rdio collection chronologically and listen in-page.☆24May 27, 2022Updated 3 years ago