tsarpaul / Azure-Functions-EoP-PoCLinks
☆29Updated 4 years ago
Alternatives and similar repositories for Azure-Functions-EoP-PoC
Users that are interested in Azure-Functions-EoP-PoC are comparing it to the libraries listed below
Sorting:
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- Burp Extension for AWS Signing☆89Updated 7 months ago
- Argument Injection in Dragonfly Ruby Gem☆16Updated 4 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆41Updated 3 years ago
- Remote Java classpath enumeration via deserialization☆22Updated 2 years ago
- ☆15Updated 4 years ago
- An Evil OIDC Server☆53Updated 2 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 4 years ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- ☆24Updated last year
- Spin up RedTeam infrastructure on AWS via Ansible☆63Updated 4 years ago
- pypykats in your browser☆55Updated 5 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 5 years ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆113Updated 6 years ago
- ☆36Updated 5 years ago
- Some of my public exploits☆51Updated 4 years ago
- A framework for exploiting padding oracles in network-based applications☆26Updated 2 years ago
- Privilege escalation using dmidecode☆20Updated 6 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Updated 4 years ago
- d(ockerp)wn - a docker pwn tool manager☆157Updated 4 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- ☆19Updated 4 years ago
- LDAP Swiss Army Knife☆49Updated last year
- WStalker: an easy proxy☆25Updated 5 years ago