tweksteen / jenkins-decryptLinks
Credentials dumper for Jenkins
☆264Updated 2 years ago
Alternatives and similar repositories for jenkins-decrypt
Users that are interested in jenkins-decrypt are comparing it to the libraries listed below
Sorting:
- PoC for CVE-2018-1002105.☆223Updated 6 years ago
- ☆214Updated 8 years ago
- ☆234Updated 6 years ago
- dockscan is security vulnerability and audit scanner for Docker installations☆219Updated 8 years ago
- Test utility for cve-2018-1002105☆195Updated 6 years ago
- A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform☆165Updated 8 months ago
- siberas JMX exploitation toolkit☆130Updated 2 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆103Updated 2 years ago
- Automate security tests using Burp Suite.☆226Updated 11 months ago
- Kubernetes Security: from Image Hygiene to Network Policies☆143Updated 7 years ago
- Shocker / Docker Breakout PoC☆119Updated 10 years ago
- Kubolt utility for scanning public kubernetes clusters☆110Updated 11 months ago
- Code Pulse is a real-time code coverage tool for penetration testing activities☆122Updated 2 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆263Updated 7 years ago
- AWS Extender (Cloud Storage Tester) is a Burp plugin to assess permissions of cloud storage containers on AWS, Google Cloud and Azure.☆250Updated 3 years ago
- Burp extension to perform Java Deserialization Attacks☆212Updated last year
- SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels☆109Updated 6 years ago
- Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (…☆314Updated 6 years ago
- An exploit for Apache Struts CVE-2017-9805☆250Updated 7 years ago
- SAML2 Burp Extension☆424Updated last month
- Run CoreOs Clair standalone☆253Updated 4 months ago
- Java Agent which mitigates deserialisation attacks by making certain classes unserializable☆188Updated 9 years ago
- Continuous Integration and Development ExploiteR☆86Updated 2 years ago
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆112Updated 6 years ago
- Kubernetes Auto Analyzer☆191Updated 5 years ago
- ☆74Updated 6 years ago
- Mass scanner for the Java serialize bug☆151Updated 6 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 7 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Updated 7 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆304Updated 2 years ago