nccgroup / go-pillage-registriesLinks
Pentester-focused Docker registry tool to enumerate and pull images
☆112Updated 5 years ago
Alternatives and similar repositories for go-pillage-registries
Users that are interested in go-pillage-registries are comparing it to the libraries listed below
Sorting:
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Updated 3 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 7 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆77Updated 5 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- Burp with Friends☆103Updated 2 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Updated 5 years ago
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆93Updated 2 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆77Updated 4 years ago
- Kubernetes Easter CTF☆59Updated 5 years ago
- ☆27Updated 2 months ago
- ☆28Updated 5 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- JIRA Secure Attachment Looter☆70Updated 5 years ago
- A Go client for crobat☆24Updated 5 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 8 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 5 years ago
- A command line security audit tool for Amazon Web Services☆82Updated 6 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆137Updated last year
- A tool to enumerate S3 buckets manually or via certstream☆82Updated 2 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆93Updated last year
- Burp Extension for AWS Signing☆90Updated 11 months ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆61Updated 4 years ago
- ☆50Updated 6 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆76Updated 2 years ago
- Ed is a tool used to identify and exploit accessible UNIX Domain Sockets☆28Updated 6 years ago
- Assorted tools for security-related task for git repositories☆58Updated 3 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 3 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago