☆30Jan 12, 2023Updated 3 years ago
Alternatives and similar repositories for k8s_ssrf_portscanner
Users that are interested in k8s_ssrf_portscanner are comparing it to the libraries listed below
Sorting:
- Some of my rough notes for Docker threat detection☆49Aug 26, 2023Updated 2 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆32Aug 29, 2023Updated 2 years ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated last month
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- FireProx written in Go☆20Apr 13, 2024Updated last year
- ☆19Aug 10, 2022Updated 3 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Nov 28, 2025Updated 3 months ago
- ☆22Jul 24, 2025Updated 7 months ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Oct 20, 2022Updated 3 years ago
- ☆17Jan 3, 2021Updated 5 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 2 years ago
- ☆25Jun 27, 2024Updated last year
- ☆18Apr 3, 2023Updated 2 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 2 years ago
- Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.☆28Feb 8, 2023Updated 3 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆20Feb 10, 2025Updated last year
- ☆30May 12, 2025Updated 9 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- ☆27Jun 3, 2023Updated 2 years ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆123Aug 20, 2023Updated 2 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Apr 13, 2024Updated last year
- ☆27Feb 19, 2026Updated 2 weeks ago
- Execute a shell command within Cloud Run☆31Jul 7, 2022Updated 3 years ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆175Nov 7, 2022Updated 3 years ago
- The security workflow engine!☆137Nov 20, 2025Updated 3 months ago
- ☆31Mar 21, 2023Updated 2 years ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- ☆13Nov 21, 2024Updated last year
- Fast multi-cluster navigation for K8s admins☆13Jul 19, 2024Updated last year
- idk man this was the default github name☆35Apr 23, 2023Updated 2 years ago
- .NET deserialization hunter☆86Jul 21, 2024Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- ☆35Jan 4, 2026Updated 2 months ago
- Reasonably undetected shellcode stager and executer.☆35May 23, 2025Updated 9 months ago
- Kubernetes audit logging, when you don't control the control plane☆91Updated this week
- ☆86Feb 4, 2026Updated last month