ropnop / pentest_charts
Some helpful Helm Charts for pentesters
☆39Updated 5 years ago
Alternatives and similar repositories for pentest_charts:
Users that are interested in pentest_charts are comparing it to the libraries listed below
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆112Updated 6 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Updated 6 years ago
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Updated 4 years ago
- A wrapper around jq, to help you parse jq output!☆30Updated 4 years ago
- Burp Extension for AWS Signing☆87Updated last week
- Kubernetes Scanner☆40Updated 2 years ago
- Proof-of-concept CORS exploitation tool.☆34Updated 5 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Updated 4 years ago
- ☆1Updated 6 years ago
- Manual JavaScript Linting is a Bug☆49Updated 3 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆44Updated 7 years ago
- A Burp extension to show the Collaborator client in a tab☆36Updated 2 years ago
- Hacking Artifactory with server side template injection☆51Updated 4 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- Provides a suite of Burp extensions and a maven plugin to automate security tests using BurpSuite.☆25Updated 6 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆23Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Swiftly search FDNS datasets from Rapid7 Open Data☆21Updated 2 years ago
- ☆25Updated 3 years ago
- ☆20Updated 5 years ago
- List of special metadata IPs used in cloud services☆11Updated 5 years ago
- Argument Injection in Dragonfly Ruby Gem☆16Updated 3 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 4 years ago
- A tool to analyse JMX API security level.☆43Updated 10 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago