random-robbie / kube-scanView external linksLinks
Kubernetes Scanner
☆40Feb 14, 2022Updated 3 years ago
Alternatives and similar repositories for kube-scan
Users that are interested in kube-scan are comparing it to the libraries listed below
Sorting:
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆23Mar 2, 2022Updated 3 years ago
- Pass list of urls with FUZZ in and it will check if it has found a potential SSRF.☆112Feb 14, 2022Updated 3 years ago
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Aug 31, 2021Updated 4 years ago
- Powershell Persistence Locator☆66Sep 11, 2016Updated 9 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 2 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- ☆11May 10, 2017Updated 8 years ago
- A CherryTree template for People OSINT. I was inspired by James Hall's CTF template and I used the lessons taught to me by Joe Gray to cr…☆11Aug 16, 2020Updated 5 years ago
- One-off scripts☆52Sep 4, 2017Updated 8 years ago
- Jar Protector - Jar Crypter☆15May 18, 2018Updated 7 years ago
- bug bounty automation☆13Jul 2, 2021Updated 4 years ago
- Snippets of scripting randomness☆13Jun 9, 2022Updated 3 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Jan 8, 2020Updated 6 years ago
- Command line tool for testing CRLF injection on a list of domains.☆166Apr 14, 2024Updated last year
- ☆92Dec 8, 2022Updated 3 years ago
- Collection of scripts for use with Carbon Black Cb Response API☆14May 7, 2022Updated 3 years ago
- ☆16May 6, 2015Updated 10 years ago
- This tests a list of s3 buckets to see if they have dir listings enabled or if they are uploadable☆55Dec 10, 2025Updated 2 months ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- Operational toolset utilizing git's submodule feature☆57Feb 6, 2013Updated 13 years ago
- ☆16Jul 7, 2020Updated 5 years ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 5 months ago
- Do some quick reconnaissance on a domain-based web-application☆13Jun 1, 2021Updated 4 years ago
- The third open source piece of ransomware using bash☆15Aug 18, 2015Updated 10 years ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆39Jun 3, 2021Updated 4 years ago
- Bash Script to Hunt all the targets/Subdomains from Chaos by Project Discovery Team☆36Sep 26, 2020Updated 5 years ago
- little scripts of bash stuff that i've found handy.☆16Feb 2, 2019Updated 7 years ago
- Convert your masscan/subdomain-scan results (80,443,8080) into screenshots for better analysis☆36Jul 10, 2018Updated 7 years ago
- ☆19Apr 29, 2015Updated 10 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- ☆16Mar 4, 2019Updated 6 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- ☆18Apr 7, 2022Updated 3 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Dec 25, 2021Updated 4 years ago