spaceB0x / cider
Continuous Integration and Development ExploiteR
☆85Updated 2 years ago
Alternatives and similar repositories for cider:
Users that are interested in cider are comparing it to the libraries listed below
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆39Updated 4 years ago
- Git Web Hook Tunnel for C2☆28Updated last year
- Security Payload Unit Test Repository (SPUTR)☆86Updated last year
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆23Updated 11 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆36Updated 6 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆78Updated 8 months ago
- Pull author and committer names and emails from Travis-CI☆11Updated 4 years ago
- Repository for Endpoint Security Testing☆35Updated 6 years ago
- ☆28Updated 2 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆82Updated 4 years ago
- Scoring Engine for CTF competitions☆46Updated 2 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 2 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- Burp Suite extension to perform Kerberos authentication☆104Updated 7 months ago
- ☆82Updated 5 years ago
- ☆59Updated 5 years ago
- ☆55Updated 4 years ago
- ☆52Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 2 months ago
- The documents☆55Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- An attempt at a Packer template to build an HVM Kali AMI that is identical to a Kali install using the official ISO.☆12Updated 8 years ago
- it-security related scripts and tools☆25Updated 5 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Updated 3 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆85Updated 7 years ago