raesene / k8s_ssrf_portscannerView external linksLinks
☆30Jan 12, 2023Updated 3 years ago
Alternatives and similar repositories for k8s_ssrf_portscanner
Users that are interested in k8s_ssrf_portscanner are comparing it to the libraries listed below
Sorting:
- Some of my rough notes for Docker threat detection☆49Aug 26, 2023Updated 2 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated 3 weeks ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- FireProx written in Go☆20Apr 13, 2024Updated last year
- ☆19Aug 10, 2022Updated 3 years ago
- ☆22Jul 24, 2025Updated 6 months ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Nov 28, 2025Updated 2 months ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Oct 20, 2022Updated 3 years ago
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Jun 14, 2023Updated 2 years ago
- ☆17Jan 3, 2021Updated 5 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Jan 28, 2024Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 2 years ago
- ☆25Jun 27, 2024Updated last year
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 2 years ago
- Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.☆28Feb 8, 2023Updated 3 years ago
- ☆28Apr 4, 2023Updated 2 years ago
- ☆29May 12, 2025Updated 9 months ago
- Symantec EDR Internals☆29Oct 12, 2021Updated 4 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆20Feb 10, 2025Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated last year
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 8 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Oct 14, 2024Updated last year
- ☆27Jun 3, 2023Updated 2 years ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆122Aug 20, 2023Updated 2 years ago
- Some helpful Helm Charts for pentesters☆38Jan 28, 2019Updated 7 years ago
- Execute a shell command within Cloud Run☆31Jul 7, 2022Updated 3 years ago
- ☆27Oct 1, 2025Updated 4 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Apr 13, 2024Updated last year
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆175Nov 7, 2022Updated 3 years ago
- The Challenge for OWASP's Kubernetes CTF☆34Apr 3, 2023Updated 2 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago
- The security workflow engine!☆136Nov 20, 2025Updated 2 months ago
- ☆31Mar 21, 2023Updated 2 years ago
- Fast multi-cluster navigation for K8s admins☆13Jul 19, 2024Updated last year
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago