redteam-project / red-containerLinks
Containerized pentesting tools
☆45Updated 3 years ago
Alternatives and similar repositories for red-container
Users that are interested in red-container are comparing it to the libraries listed below
Sorting:
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Updated 6 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆112Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Updated 3 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 8 years ago
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆93Updated 2 years ago
- ☆28Updated 5 years ago
- Unofficial api for cve.mitre.org☆40Updated 4 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆17Updated 7 years ago
- ☆27Updated 3 months ago
- Ansible role for security standards compliance☆13Updated 6 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 3 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 3 years ago
- ☆25Updated 4 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 7 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago
- Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits☆45Updated 3 years ago
- Burp Extension for AWS Signing☆90Updated last year
- Pivot into private VPC networks using a VPN connection☆42Updated 6 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- A fileless Windows keylogger that exfils via DNS.☆33Updated 8 years ago
- A static website template for security pages.☆53Updated 5 months ago
- This repo contains workshop material delivered at #nullcon2020☆16Updated 5 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆78Updated 5 years ago
- Ruby command-line interface to Burp Suite's REST API☆58Updated 5 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 8 years ago
- Redis Security Map - Anti-hacking for Redis☆31Updated 3 years ago
- ☆68Updated 8 years ago