tsarpaul / Azure-Functions-EoP-PoCLinks
☆29Updated 4 years ago
Alternatives and similar repositories for Azure-Functions-EoP-PoC
Users that are interested in Azure-Functions-EoP-PoC are comparing it to the libraries listed below
Sorting:
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 5 years ago
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆41Updated 3 years ago
- ☆25Updated last year
- Some of my public exploits☆51Updated 5 years ago
- Burp Extension for AWS Signing☆89Updated 8 months ago
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆113Updated 6 years ago
- A malicious LDAP server for JNDI injection attacks☆75Updated 10 months ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- CTF Writeups☆26Updated 5 years ago
- Remote Java classpath enumeration via deserialization☆22Updated 2 years ago
- Jekyll Files for cloudsecwiki.com☆49Updated 4 years ago
- Privilege escalation using dmidecode☆20Updated 6 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Updated 5 years ago
- Template repo for Conjur repositories☆17Updated 3 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆33Updated 8 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 4 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆63Updated 5 years ago
- Capture all RabbitMQ messages being sent through a broker.☆32Updated 4 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- pypykats in your browser☆55Updated 6 years ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 2 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 5 years ago