tweksteen / jenkins-decryptLinks
Credentials dumper for Jenkins
☆270Updated 2 years ago
Alternatives and similar repositories for jenkins-decrypt
Users that are interested in jenkins-decrypt are comparing it to the libraries listed below
Sorting:
- PoC for CVE-2018-1002105.☆222Updated 6 years ago
- ☆232Updated 6 years ago
- A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform☆166Updated last year
- ☆215Updated 9 years ago
- dockscan is security vulnerability and audit scanner for Docker installations☆219Updated 9 years ago
- This Dockerfile builds a Debian-based Docker container with Metasploit-Framework installed. A quick and easy way to deploy Metasploit on…☆100Updated last year
- A collection of pentest tools and resources targeting Hadoop environments☆266Updated 4 years ago
- Automate security tests using Burp Suite.☆232Updated last year
- An exploit for Apache Struts CVE-2017-9805☆249Updated 8 years ago
- siberas JMX exploitation toolkit☆130Updated 2 years ago
- ☆147Updated 5 years ago
- Shocker / Docker Breakout PoC☆121Updated 11 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Updated 2 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 8 years ago
- Burp extension to perform Java Deserialization Attacks☆215Updated last year
- Kubolt utility for scanning public kubernetes clusters☆110Updated 5 months ago
- SAML2 Burp Extension☆435Updated last month
- A collection of enhancements for Portswigger's popular Burp Suite web penetration testing tool.☆153Updated last year
- Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits☆45Updated 3 years ago
- Test utility for cve-2018-1002105☆195Updated 6 years ago
- AWS Extender (Cloud Storage Tester) is a Burp plugin to assess permissions of cloud storage containers on AWS, Google Cloud and Azure.☆256Updated 3 years ago
- Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (…☆315Updated 6 years ago
- IBM/Lotus Domino exploitation☆120Updated 5 years ago
- Kubernetes Security: from Image Hygiene to Network Policies☆144Updated 7 years ago
- Grab ssh keys from ssh-agent☆223Updated 5 years ago
- ☆218Updated 3 years ago
- Python automation of Docker.sock abuse☆211Updated 2 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Updated 7 years ago
- Central Repo for Burp extensions☆151Updated 4 years ago
- PoC exploit for CVE-2018-11235 allowing RCE on git clone --recurse-submodules☆48Updated 5 years ago