raesene / k8s_ssrf_portscanner
☆31Updated 2 years ago
Alternatives and similar repositories for k8s_ssrf_portscanner:
Users that are interested in k8s_ssrf_portscanner are comparing it to the libraries listed below
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆21Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated last month
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 6 months ago
- A collection of utilities for building extensions using Burp's Montoya API☆50Updated 9 months ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆30Updated last month
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- Additional active scan checks for BURP☆26Updated 6 months ago
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 7 months ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated 7 months ago
- WAF bypass PoC☆47Updated last year
- Simple PoC for demonstrating Race Conditions on Websockets☆56Updated last year
- ☆70Updated 3 years ago
- POC for CVE-2022-23648☆36Updated 3 years ago
- Tool to spray AWS Console IAM Logins☆29Updated 2 years ago
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 8 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 7 months ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated 7 months ago
- Backend for Nuclear Pond☆21Updated last year
- Proof of Concepts for unsafe deserialization in Ruby☆17Updated 6 months ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆39Updated 4 months ago
- PoC repository for CVE-2023-29007☆33Updated last year
- Exploit for CVE-2021-25741 vulnerability☆28Updated 3 years ago
- Java archive implant toolkit.☆60Updated last week
- Make better use of the embedded browser that comes by default with Burp☆43Updated last year
- ☆30Updated 2 weeks ago
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆32Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆27Updated 3 weeks ago