nccgroup / go-pillage-registries
Pentester-focused Docker registry tool to enumerate and pull images
☆105Updated 5 years ago
Alternatives and similar repositories for go-pillage-registries:
Users that are interested in go-pillage-registries are comparing it to the libraries listed below
- This repo gives an overview of some GCP metadata API attack and defend patterns☆76Updated 4 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Updated 5 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- Burp with Friends☆102Updated 2 years ago
- Kubernetes Easter CTF☆58Updated 4 years ago
- JIRA Secure Attachment Looter☆69Updated 4 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆77Updated 4 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆102Updated 5 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆103Updated 2 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- ☆27Updated 4 months ago
- A Go client for crobat☆24Updated 5 years ago
- ☆28Updated 4 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆92Updated last year
- Burp Extension for AWS Signing☆87Updated 2 months ago
- ☆49Updated 4 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆82Updated 4 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- Scans Slack for API tokens, credentials, passwords, and more using YARA rules☆39Updated 4 years ago
- Kubernetes Pwnage for all☆56Updated 4 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Updated 2 years ago
- A tool to enumerate S3 buckets manually or via certstream☆82Updated last year
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- ☆18Updated 4 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆134Updated 5 months ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- ☆122Updated 7 years ago