nixwizard / kube-alien
☆25Updated 3 years ago
Alternatives and similar repositories for kube-alien:
Users that are interested in kube-alien are comparing it to the libraries listed below
- Advanced Vulnerable Web Application (AVWA)☆14Updated 7 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- Socks5 server over Websockets☆40Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- Simple development DNS server written in python☆26Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- ☆20Updated 5 years ago
- Updated 6 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 10 years ago
- ☆38Updated 4 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- Office 365 MFA capture toolkit☆12Updated 7 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- Mimikatz HashClash☆12Updated 9 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- A Pythonic wrapper to MassDNS☆24Updated 7 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- Various snippets created during malware analysis☆22Updated 7 years ago