redteam-project / red-containerLinks
Containerized pentesting tools
☆45Updated 3 years ago
Alternatives and similar repositories for red-container
Users that are interested in red-container are comparing it to the libraries listed below
Sorting:
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆92Updated 2 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Updated 5 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 3 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆112Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits☆45Updated 3 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago
- Pivot into private VPC networks using a VPN connection☆43Updated 6 years ago
- ☆28Updated 5 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Updated 3 years ago
- This repo contains workshop material delivered at #nullcon2020☆16Updated 5 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- ☆68Updated 8 years ago
- ☆25Updated 4 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 8 years ago
- A CLI tool for querying passive DNS services☆42Updated 2 years ago
- Security conferences talks☆25Updated 5 years ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Updated 6 years ago
- Continuous Integration and Development ExploiteR☆87Updated 3 years ago
- Scan for and exploit Consul agents☆39Updated 6 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Updated 3 years ago
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Collection of Slides From My Conference Talks☆20Updated 3 years ago
- A command line security audit tool for Amazon Web Services☆82Updated 6 years ago
- A fileless Windows keylogger that exfils via DNS.☆33Updated 8 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago