naorhaziz / ecscapeView external linksLinks
PoC for CVE-Requested vulnerability in Amazon ECS (EC2 launch type) allowing cross-task IAM credential theft.
☆46Aug 20, 2025Updated 5 months ago
Alternatives and similar repositories for ecscape
Users that are interested in ecscape are comparing it to the libraries listed below
Sorting:
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆21Jul 31, 2025Updated 6 months ago
- RabbitMQ exploit and Pentesting guide for penetration tester☆20Nov 22, 2023Updated 2 years ago
- docker env for ios research on a mac host☆27Jun 12, 2025Updated 8 months ago
- A small webserver vulnerable to insecure deserialization☆20Nov 30, 2017Updated 8 years ago
- ☆29May 14, 2019Updated 6 years ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- ☆10Sep 24, 2021Updated 4 years ago
- This sample repositories provides an production ready example of enhancing AWS SSO for enterprise usage. We provide an automation for ass…☆16Jul 8, 2025Updated 7 months ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- ☆10Mar 11, 2024Updated last year
- ☆10Mar 6, 2023Updated 2 years ago
- ☆14Feb 19, 2023Updated 2 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- A series of cloud focused KQL queries for threat hunting and DFIR☆11Oct 21, 2025Updated 3 months ago
- DNS over HTTPS targeted malware (only runs once)☆96Aug 16, 2023Updated 2 years ago
- JavaScript for Automation (JXA) tool to do Active Directory enumeration.☆106Feb 19, 2022Updated 3 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Dec 22, 2023Updated 2 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 9 months ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- reinforcement learning for optimal debt collection strategy☆11Dec 8, 2019Updated 6 years ago
- The Chinese Version of The Rust Reference☆10Oct 13, 2024Updated last year
- 🛠️ Explore custom C2 TTPs with Aether-C2-Framework, focusing on lightweight Rust implants and stealthy transport stacks to reduce forens…☆18Updated this week
- ☆12Aug 22, 2023Updated 2 years ago
- Load and resolve Cargo configuration.☆17Updated this week
- list of resource about low level dev☆18Nov 15, 2025Updated 2 months ago
- XML builder macro letting you write XML inside Rust code☆10Nov 15, 2023Updated 2 years ago
- Custom formatting for Rust.☆10Nov 21, 2025Updated 2 months ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- mdbook on common pitfalls in unsafe rust code☆11May 24, 2019Updated 6 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated last year
- Visualize an Rdio collection chronologically and listen in-page.☆24May 27, 2022Updated 3 years ago
- Support for compiling C programs with Eyra☆15Oct 13, 2024Updated last year
- Zero-terminated string types for FFI.☆13Mar 13, 2023Updated 2 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year