theNetworkChuck / kubernetes
☆14Updated 4 years ago
Alternatives and similar repositories for kubernetes:
Users that are interested in kubernetes are comparing it to the libraries listed below
- A lightweight ducky script generator written in python.☆30Updated 4 years ago
- The SimpleLogin back-end☆26Updated last week
- Enumerate wordpress users in 1 second.☆15Updated 7 years ago
- 📒 Quick script to generate a table of contents from a markdown document☆15Updated last year
- Personal blog about cyber security and challenges☆17Updated 10 months ago
- Stuff for Dark Web Website hosting☆27Updated last year
- ☆19Updated 6 years ago
- Modern Javascript keylogger with web panel☆21Updated 4 years ago
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Updated 2 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated 2 years ago
- OSINT tool to scrape names and usernames from large friend lists on Facebook, without being rate limited.☆10Updated 2 years ago
- AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!☆12Updated 5 years ago
- BlizzardWrap - A CLI tool for encoding and decoding (supports several formats/algos)☆15Updated 3 years ago
- SQLi Google Dork Scanner (new version)☆16Updated 3 years ago
- Fuck Them With Spam☆21Updated 9 months ago
- This repository will contain python scripts for hackers and pentesters☆25Updated 2 years ago
- A command-line whois - like client for the WHOIS and WHOIS History APIs by WhoisXML API Inc.☆18Updated 3 years ago
- This is where I'll be sharing payloads that I make for the P4wnP1. Never done anything like this so feel free to improve upon my messes.☆9Updated 3 years ago
- A port scanner written in PowerShell☆13Updated 3 years ago
- Created by Denis Podgurskiy via the GitHub Connector☆12Updated 3 years ago
- PwnPI, skip all the errors while installing PwnPI on your RPI3, just follow the README.☆12Updated 7 years ago
- OSINT programs using open data from the city of Los Angeles☆17Updated 5 years ago
- Compilation of commands for hacking tasks and security tools as a bit of everything☆15Updated 3 months ago
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆13Updated 4 years ago
- Simple RDP Brute Forcer in python using NLA☆30Updated 3 years ago
- Api for sherlock module☆66Updated 3 years ago
- 🌐🔍 Red Network Tool is a tool for network exploration and info finding.☆39Updated 2 years ago
- Detect deauthentication attack using NodeMCU☆36Updated 6 years ago
- This Script Will Detect Canary Token in Microsoft Word Documents☆52Updated 4 years ago
- Hacking, pen-testing, and cyber-security related tools built with Python.☆37Updated 4 years ago