protectai / Snaike-MLflow
☆34Updated this week
Related projects: ⓘ
- using ML models for red teaming☆39Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆49Updated 6 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆58Updated 5 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆20Updated 3 weeks ago
- ☆91Updated this week
- Enumerate AWS permissions and resources.☆62Updated 2 years ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆84Updated 7 months ago
- source code for the offsecml framework☆30Updated 3 months ago
- Cloud Exploit Framework☆112Updated 2 years ago
- Manage attack surface data on Elasticsearch☆19Updated 10 months ago
- A set of open-source community scripts☆61Updated 3 weeks ago
- ☆25Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆59Updated 2 weeks ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆41Updated 3 months ago
- ☆27Updated last year
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆19Updated 3 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆19Updated last month
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆27Updated last year
- Monitoring the Cloud Landscape☆70Updated last week
- ☆33Updated 6 months ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆42Updated 10 months ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated 9 months ago
- Most common AWS S3 bucket names.☆23Updated 4 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆15Updated 2 weeks ago
- ☆15Updated last year
- 2022 CTF public release☆24Updated 2 years ago
- Filters and highlights Proxy HTTP history for requests with potentially vulnerable parameters☆22Updated 9 months ago
- My talks...☆23Updated 11 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated 10 months ago
- Nuclei template to detect Apache servers vulnerable to CVE-2024-38473☆22Updated 3 weeks ago