tweksteen / jenkins-decryptLinks
Credentials dumper for Jenkins
☆269Updated 2 years ago
Alternatives and similar repositories for jenkins-decrypt
Users that are interested in jenkins-decrypt are comparing it to the libraries listed below
Sorting:
- PoC for CVE-2018-1002105.☆222Updated 6 years ago
- ☆232Updated 6 years ago
- A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform☆165Updated last year
- dockscan is security vulnerability and audit scanner for Docker installations☆219Updated 9 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆266Updated 4 years ago
- Test utility for cve-2018-1002105☆195Updated 6 years ago
- ☆215Updated 9 years ago
- SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels☆110Updated 6 years ago
- siberas JMX exploitation toolkit☆130Updated 2 years ago
- A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆88Updated 6 months ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Updated 2 years ago
- Shocker / Docker Breakout PoC☆121Updated 11 years ago
- Python automation of Docker.sock abuse☆212Updated 2 years ago
- SAML2 Burp Extension☆430Updated this week
- An exploit for Apache Struts CVE-2017-9805☆249Updated 7 years ago
- Grab ssh keys from ssh-agent☆223Updated 5 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Updated 8 years ago
- Automate security tests using Burp Suite.☆232Updated last year
- A collection of enhancements for Portswigger's popular Burp Suite web penetration testing tool.☆153Updated last year
- Burp extension to perform Java Deserialization Attacks☆214Updated last year
- The source code v2.0 of https://requestbin.net (now is v3.0)☆176Updated 3 weeks ago
- Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)☆206Updated 6 years ago
- Kubolt utility for scanning public kubernetes clusters☆110Updated 4 months ago
- IBM/Lotus Domino exploitation☆120Updated 5 years ago
- Repository holding all alternatives of *nix backdoors.☆153Updated 10 years ago
- A simple script to decrypt stored passwords from Oracle WebLogic Server configuration files☆30Updated 9 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Updated 7 years ago
- This Dockerfile builds a Debian-based Docker container with Metasploit-Framework installed. A quick and easy way to deploy Metasploit on…☆100Updated last year
- Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits☆45Updated 3 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 8 years ago