tsarpaul / Azure-Functions-EoP-PoCLinks
☆29Updated 4 years ago
Alternatives and similar repositories for Azure-Functions-EoP-PoC
Users that are interested in Azure-Functions-EoP-PoC are comparing it to the libraries listed below
Sorting:
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆63Updated 4 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 5 years ago
- An Evil OIDC Server☆53Updated 2 years ago
- Burp Extension for AWS Signing☆89Updated 6 months ago
- A basic AIX enumeration guide for penetration testers/red teamers☆33Updated 8 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Remote Java classpath enumeration via deserialization☆22Updated 2 years ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 2 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆41Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- pypykats in your browser☆55Updated 5 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- LDAP Swiss Army Knife☆49Updated last year
- bash poc scripts to exploit open fpm ports☆60Updated 6 years ago
- ☆36Updated 5 years ago
- Privilege escalation using dmidecode☆20Updated 6 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- d(ockerp)wn - a docker pwn tool manager☆157Updated 4 years ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 5 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 4 years ago
- ☆36Updated 7 years ago
- A framework for exploiting padding oracles in network-based applications☆26Updated 2 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- named pipe server with impersonation☆59Updated 6 years ago
- POC for CVE-2022-23648☆36Updated 3 years ago