nccgroup / go-pillage-registriesView external linksLinks
Pentester-focused Docker registry tool to enumerate and pull images
☆112Jan 27, 2020Updated 6 years ago
Alternatives and similar repositories for go-pillage-registries
Users that are interested in go-pillage-registries are comparing it to the libraries listed below
Sorting:
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Variety of kubectl krew tools usually security focused☆34Jul 17, 2025Updated 7 months ago
- A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!☆87Apr 3, 2020Updated 5 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated last year
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆17Dec 20, 2018Updated 7 years ago
- Tool to extract & validate google fcm server keys from apks☆30Jan 20, 2021Updated 5 years ago
- AWS SSO serverless phishing API.☆32Jun 30, 2021Updated 4 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Aug 27, 2021Updated 4 years ago
- Validate proxies for specific domain☆38Aug 14, 2021Updated 4 years ago
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Apr 22, 2022Updated 3 years ago
- Slides and Code for the BHUSA 2019 talk: Flying a False Flag☆239Nov 8, 2019Updated 6 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Nov 30, 2018Updated 7 years ago
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆211Aug 18, 2021Updated 4 years ago
- ☆21May 20, 2016Updated 9 years ago
- OAuth Security Cheatsheet☆41May 12, 2014Updated 11 years ago
- ☆271Jan 14, 2026Updated last month
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- A very vulnerable serverless application in AWS Lambda☆98Oct 7, 2019Updated 6 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Apr 20, 2023Updated 2 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- ☆13Oct 29, 2024Updated last year
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Apr 26, 2020Updated 5 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆349Jul 20, 2020Updated 5 years ago
- Slides from previous conference talks☆41May 13, 2017Updated 8 years ago
- Reverse shell container for k8s deployments☆49Feb 21, 2020Updated 5 years ago
- ☆24Aug 9, 2022Updated 3 years ago
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆750Apr 12, 2022Updated 3 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆163Nov 28, 2025Updated 2 months ago