☆30Jan 12, 2023Updated 3 years ago
Alternatives and similar repositories for k8s_ssrf_portscanner
Users that are interested in k8s_ssrf_portscanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some of my rough notes for Docker threat detection☆50Aug 26, 2023Updated 2 years ago
- The Challenge for OWASP's Kubernetes CTF☆34Apr 3, 2023Updated 2 years ago
- Used to check Github actions logs for secrets - specifically tj-actions and reviewdog☆22Mar 18, 2025Updated last year
- Bug Bounty tool to automate the recon process.☆12Oct 4, 2023Updated 2 years ago
- SSRF (Server Side Request Forgery) testing resources☆12Sep 7, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Threat-informed defense for cloudnative: Reference Implementation of a so-called Honeycluster - The detection capabilities can also be us…☆55Mar 15, 2026Updated 2 weeks ago
- ☆18Apr 3, 2023Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆35Feb 9, 2024Updated 2 years ago
- FireProx written in Go☆20Apr 13, 2024Updated last year
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 3 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- 云原生安全漏洞收集☆18Jul 9, 2025Updated 8 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- POC for CVE-2022-23648☆36Mar 29, 2022Updated 4 years ago
- ☆19Aug 10, 2022Updated 3 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated last year
- Convert between OpenAPI v2 and v3 formats (YAML/JSON)☆10Apr 29, 2020Updated 5 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Nov 28, 2025Updated 4 months ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated 2 months ago
- A replacement for "kubectl exec" that works over WebSocket connections.☆43Mar 30, 2024Updated last year
- Kernel Read Write Execute☆46Jan 13, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Apr 13, 2024Updated last year
- ☆108Nov 15, 2025Updated 4 months ago
- ☆97Dec 25, 2025Updated 3 months ago
- ☆22Jul 24, 2025Updated 8 months ago
- An Event Tracing for Windows (ETW) EventSource generator built on .Net Core 2.0☆11Dec 8, 2022Updated 3 years ago
- Symantec EDR Internals☆30Oct 12, 2021Updated 4 years ago
- CVE-2022-25765 pdfkit <0.8.6 command injection.☆15Dec 21, 2022Updated 3 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 6 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆164Nov 28, 2025Updated 4 months ago
- ☆29Jan 31, 2025Updated last year
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 10 months ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Oct 2, 2025Updated 5 months ago
- boostsecurityio/lotp☆147Mar 3, 2026Updated 3 weeks ago
- Link sources to sinks in C# applications.☆150Apr 10, 2023Updated 2 years ago
- ☆17Jan 3, 2021Updated 5 years ago