ropnop / pentest_chartsLinks
Some helpful Helm Charts for pentesters
☆39Updated 6 years ago
Alternatives and similar repositories for pentest_charts
Users that are interested in pentest_charts are comparing it to the libraries listed below
Sorting:
- Burp Extension for AWS Signing☆89Updated 8 months ago
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆113Updated 6 years ago
- Jekyll Files for cloudsecwiki.com☆49Updated 4 years ago
- Hacking Artifactory with server side template injection☆51Updated 5 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 5 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆28Updated 9 months ago
- Proof-of-concept CORS exploitation tool.☆35Updated 6 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆41Updated 3 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 5 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Updated 5 years ago
- UUID issues for Burp Suite☆52Updated 3 years ago
- ☆25Updated last year
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Python tool for large scale git analysis. Inspired by gitrob.☆20Updated 5 years ago
- Tool to pentest spark clusters☆32Updated last year
- RCE in NPM VSCode Extension☆20Updated 4 years ago
- Full TTY reverse shell over SSH☆58Updated 5 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Default plugins for Jaeles Scanner☆35Updated 4 years ago
- ☆10Updated 6 years ago
- ☆29Updated 4 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Updated 6 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Updated 5 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago
- ☆38Updated 5 years ago
- A malicious LDAP server for JNDI injection attacks☆75Updated 10 months ago
- A wrapper around jq, to help you parse jq output!☆30Updated 5 years ago
- ☆25Updated 4 years ago
- An Evil OIDC Server☆54Updated 2 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Updated 7 years ago