yandex-cloud / cq-source-ycLinks
Yandex Cloud CloudQuery source plugin
☆19Updated last month
Alternatives and similar repositories for cq-source-yc
Users that are interested in cq-source-yc are comparing it to the libraries listed below
Sorting:
- GitLab CI security tools runner☆18Updated 2 years ago
- ☆76Updated 3 years ago
- A list of checks with tips for analyzing the security of Android applications☆14Updated 6 years ago
- Wildcard DNS with few features☆13Updated last week
- Race Condition framework☆273Updated 3 years ago
- Перевод BSIMM (https://www.bsimm.com) на русский язык☆23Updated 3 years ago
- Awesome DevSecOps на русском языке☆324Updated 2 years ago
- Turn your Burp suite into headless active web application vulnerability scanner☆154Updated 7 years ago
- Examples for Advanced Web Hacking Workshop☆34Updated 5 years ago
- ☆230Updated 2 years ago
- Burp Suite plugin for binary search on HTTP parameters☆17Updated 8 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆20Updated 7 years ago
- ☆13Updated 5 years ago
- Careful tool for security checking release apk/ipa files☆38Updated 4 years ago
- Kubolt utility for scanning public kubernetes clusters☆110Updated last week
- ☆89Updated 3 years ago
- ☆10Updated 10 years ago
- Asynchronous HTTP pipelining directory buster☆24Updated 5 years ago
- Small DNS Recon utility, allows you to obtain some useful info about NS-servers placed behind relays, firewalls, etc.☆21Updated 8 years ago
- ☆35Updated 4 years ago
- Git manager for pentesters☆108Updated 9 years ago
- Tasks from Hack Battle by SPbCTF at PHDays 9☆10Updated 4 years ago
- QCTF School 2018. Developed with ♥ by Hackerdom team☆12Updated 7 years ago
- System of Orchestration, Lifecycle control, Detection and Response☆61Updated last year
- ☆12Updated 9 years ago
- ☆31Updated 2 years ago
- A cheat sheet for pentesters and researchers about vulnerabilities in well-known monitoring systems.☆168Updated 4 years ago
- exploit for ImageMagick's uninitialized memory disclosure in gif coder☆285Updated 8 years ago
- Docker image to exploit RCE, try for pentest methods and test container security solutions (trivy, falco and etc.)☆94Updated 5 years ago
- A small course on CTF (wargames) for beginners [in Russian]☆276Updated 3 years ago