☆30Jan 12, 2023Updated 3 years ago
Alternatives and similar repositories for k8s_ssrf_portscanner
Users that are interested in k8s_ssrf_portscanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some of my rough notes for Docker threat detection☆51Aug 26, 2023Updated 2 years ago
- Free Windows privilege escalation lab inspired by HTB Devel, built for PNPT and OSCP practice.☆23Jan 13, 2026Updated 3 months ago
- OID-See is an identity attack surface mapping tool that models OAuth trust, persistence, and impersonation paths in Entra using a graph-b…☆35Mar 31, 2026Updated 2 weeks ago
- Web Application Attack☆14Dec 16, 2019Updated 6 years ago
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆32Aug 29, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Used to check Github actions logs for secrets - specifically tj-actions and reviewdog☆22Mar 18, 2025Updated last year
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- A Terraform reproducer for IngressNightmare☆26Mar 26, 2025Updated last year
- Bug Bounty tool to automate the recon process.☆12Oct 4, 2023Updated 2 years ago
- Threat-informed defense for cloudnative: Reference Implementation of a so-called Honeycluster - The detection capabilities can also be us…☆56Updated this week
- ☆18Apr 3, 2023Updated 3 years ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆37Feb 9, 2024Updated 2 years ago
- FireProx written in Go☆20Apr 13, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 3 years ago
- 云原生安全漏洞收集☆18Jul 9, 2025Updated 9 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated 2 years ago
- VBScript minifier☆25Updated this week
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Nov 28, 2025Updated 4 months ago
- ☆31Mar 21, 2023Updated 3 years ago
- ☆13Nov 21, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated 2 months ago
- A replacement for "kubectl exec" that works over WebSocket connections.☆43Mar 30, 2024Updated 2 years ago
- ☆25Aug 2, 2023Updated 2 years ago
- Kernel Read Write Execute☆46Jan 13, 2025Updated last year
- ☆110Mar 29, 2026Updated 3 weeks ago
- idk man this was the default github name☆35Apr 23, 2023Updated 2 years ago
- Symantec EDR Internals☆30Oct 12, 2021Updated 4 years ago
- Tool to retrieve Config from Redline C2 servers☆16Mar 14, 2023Updated 3 years ago
- POC for Spring Kafka Deserialization Vulnerability CVE-2023-34040☆46Oct 8, 2025Updated 6 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Unauthenticated enumeration of AWS IAM Roles.☆26Updated this week
- A Nuclei security scanning server based on MCP (Model Control Protocol), providing convenient vulnerability scanning services.一个基于 MCP (M…☆21Aug 24, 2025Updated 7 months ago
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 10 months ago
- Supply Chain Security Research - Living Off The Pipeline tools☆149Updated this week
- ☆17Jan 3, 2021Updated 5 years ago
- ☆28Apr 4, 2023Updated 3 years ago
- ☆27Jun 3, 2023Updated 2 years ago