Kube-Score – Kubernetes Object Analysis With Recommendations For Improved Reliability And Security
kube-score is a tool that performs static code analysis of your Kubernetes object definitions. The output is a list of...
kube-score is a tool that performs static code analysis of your Kubernetes object definitions. The output is a list of...
This script was to developed to capture screenshot during pentest engagment and OSCP. IMPORTANT: The screenshot feature is no longer...
The importance of information security in the modern business world cannot be overstated. It’s vital for organizations to take a...
#Manual Port Scanning #Enumerate Potential Service If you like the tool and for my personal motivation so as to develop...
This Is Advance Phishing Tool! OTP PHISHING SPECIAL OTP BYPASS VIDEO WORKEDSocial Media Hack Link Installation Termux https://www.youtube.com/watch?v=LO3hX1lLBjI Whatsapp OTP...
Timewarrior is a time tracking utility that offers simple stopwatch features as well as sophisticated calendar-based backfill, along with flexible...
Asnap aims to render recon phase easier by providing regularly updated data about which companies owns which ipv4 or ipv6...
Unicode encoding attacks with machine learning. Tool based on machine learning to create amazing fake domains using confusables. Some domains...
SMB AutoRelay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environments. Usage...
Powerglot encodes several kind of scripts using polyglots, for example, offensive powershell scripts. It is not needed a loader to...
Scrape/Parse Pastebin using GO and grammar expression (PEG). Installation$ go get -u github.com/notdodo/pastego UsageSearch keywords are case sensitive pastego -s...
We know your cybersecurity team is facing unprecedented challenges, including new and complex attacks that exploit your remote workforce and...
h2cSmuggler smuggles HTTP traffic past insecure edge-server proxy_pass configurations by establishing HTTP/2 cleartext (h2c) communications with h2c-compatible back-end servers, allowing...
Small utility program to perform multiple operations for a given subnet/CIDR ranges. The tool was developed to ease load distribution...
In April 2020, security researcher Gil Dabah published a paper on a set of vulnerabilities he had discovered within the...
A multiprocessing approach to auditing Active Directory passwords using Python. About Lil PwnyLil Pwny is a Python application to perform...
Polypyus learns to locate functions in raw binaries by extracting known functions from similar binaries. Thus, it is a firmware...
Today's topic is Exchange 2010, which reaches end of support (EoS) on Oct. 13, 2020, as well as a survey...
In this four-part series, we’ll explore key considerations and strategies for 2021 detection and response planning, and ways InsightIDR, Managed...
Its been about 2-weeks since we released Empire 3.4, and hopefully, everyone has had a chance to check out all...
NERVE is a vulnerability scanner tailored to find low-hanging fruit level vulnerabilities, in specific application configurations, network services, and unpatched...
Cooolis-ms is a server that supports Metasploit Framework RPC. It is used to work for Shellcode and PE loader, bypassing...
PwnedPasswordsChecker is a tool that checks if the hash of a known password (in SHA1 or NTLM format) is present...
A set of scripts to help perform an online dictionary attack against a WPA3 access point. Wacker leverages the wpa_supplicant...