kube-bench is tool that checks whether Kubernetes is deployed securely
#k8s #YAML #KubeBench #KubernetesSecurity #cisSecurity #Kubernetes
https://reconshell.com/kube-bench-is-tool-that-checks-whether-kubernetes-is-deployed-securely/
#k8s #YAML #KubeBench #KubernetesSecurity #cisSecurity #Kubernetes
https://reconshell.com/kube-bench-is-tool-that-checks-whether-kubernetes-is-deployed-securely/
Penetration Testing Tools, ML and Linux Tutorials
kube-bench is tool that checks whether Kubernetes is deployed securely - Penetration Testing Tools, ML and Linux Tutorials
Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
CVE-2020-4974
IBM Jazz Foundation products are vulnerable to server side request forgery (SSRF).
https://cve.reconshell.com/cve/CVE-2020-4974
IBM Jazz Foundation products are vulnerable to server side request forgery (SSRF).
https://cve.reconshell.com/cve/CVE-2020-4974
IGopher : Golang smart bot for Instagram DM
#IGopher #Golang #InstagramBot
https://reconshell.com/igopher-golang-smart-bot-for-instagram-dm/
#IGopher #Golang #InstagramBot
https://reconshell.com/igopher-golang-smart-bot-for-instagram-dm/
Penetration Testing Tools, ML and Linux Tutorials
IGopher : Golang smart bot for Instagram DM - Penetration Testing Tools, ML and Linux Tutorials
This project is under active development, there may be bugs or missing features. If you have any problem or would like to see a feature implemented, please,
TokenTactics - Azure JWT Token Manipulation Toolset
#AzureHound #Azure #JWT #TokenTactics
https://reconshell.com/tokentactics-azure-jwt-token-manipulation-toolset/
#AzureHound #Azure #JWT #TokenTactics
https://reconshell.com/tokentactics-azure-jwt-token-manipulation-toolset/
Penetration Testing Tools, ML and Linux Tutorials
TokenTactics - Azure JWT Token Manipulation Toolset - Penetration Testing Tools, ML and Linux Tutorials
Azure access tokens allow you to authenticate to certain endpoints as a user who signs in with a device code. Even if they used multi-factor authentication.
In0ri - Defacement detection with deep learning
#DeepLearning #Defacement #In0ri
https://reconshell.com/in0ri-defacement-detection-with-deep-learning/
#DeepLearning #Defacement #In0ri
https://reconshell.com/in0ri-defacement-detection-with-deep-learning/
Penetration Testing Tools, ML and Linux Tutorials
In0ri - Defacement detection with deep learning - Penetration Testing Tools, ML and Linux Tutorials
In0ri is a defacement detection system utilizing a image-classification convolutional neural network.
reconmap - VAPT automation and reporting platform
#VAPT #VulnerabilityAssessment #PenetrationTesting #infosec
https://reconshell.com/reconmap-vapt-automation-and-reporting-platform/
#VAPT #VulnerabilityAssessment #PenetrationTesting #infosec
https://reconshell.com/reconmap-vapt-automation-and-reporting-platform/
Penetration Testing Tools, ML and Linux Tutorials
reconmap - VAPT automation and reporting platform - Penetration Testing Tools, ML and Linux Tutorials
Reconmap is a vulnerability assessment and penetration testing (VAPT) platform. It helps software engineers and infosec pros collaborate on security projects,
purpleteam - CLI component of OWASP PurpleTeam
#PurpleTeam #OWASP
https://reconshell.com/purpleteam-cli-component-of-owasp-purpleteam/
#PurpleTeam #OWASP
https://reconshell.com/purpleteam-cli-component-of-owasp-purpleteam/
Penetration Testing Tools, ML and Linux Tutorials
purpleteam - CLI component of OWASP PurpleTeam - Penetration Testing Tools, ML and Linux Tutorials
CLI component of purpleteam - Currently in alpha
Joi security - Detect security flaws in Joi validation schemas
#SQLInjection #XSS #SSRF #RCE #LFI #SecurityFlaws
https://reconshell.com/joi-security-detect-security-flaws-in-joi-validation-schemas/
#SQLInjection #XSS #SSRF #RCE #LFI #SecurityFlaws
https://reconshell.com/joi-security-detect-security-flaws-in-joi-validation-schemas/
CredPhish - PowerShell script designed to invoke legitimate credential prompts
#CredPhish #PowerShell #DNSexfiltration #Phishing #Windows
https://reconshell.com/credphish-powershell-script-designed-to-invoke-legitimate-credential-prompts/
#CredPhish #PowerShell #DNSexfiltration #Phishing #Windows
https://reconshell.com/credphish-powershell-script-designed-to-invoke-legitimate-credential-prompts/
Penetration Testing Tools, ML and Linux Tutorials
CredPhish - PowerShell script designed to invoke legitimate credential prompts - Penetration Testing Tools, ML and Linux Tutorials
CredPhish is a PowerShell script designed to invoke credential prompts and exfiltrate passwords. It relies on CredentialPicker to collect user
Damn Vulnerable GraphQL Application
#GraphQL #CodeExecution #Injection #DoS #SSRF
https://reconshell.com/damn-vulnerable-graphql-application/
#GraphQL #CodeExecution #Injection #DoS #SSRF
https://reconshell.com/damn-vulnerable-graphql-application/
Penetration Testing Tools, ML and Linux Tutorials
Damn Vulnerable GraphQL Application - Penetration Testing Tools, ML and Linux Tutorials
Damn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
Top 10 Most Exciting Cloud Computing Trends
#Data1Security #HybridCloud #DisasterRecovery
#BigData #CloudComputing #Cloud
https://reconshell.com/cloud-computing-trends/
#Data1Security #HybridCloud #DisasterRecovery
#BigData #CloudComputing #Cloud
https://reconshell.com/cloud-computing-trends/
Penetration Testing Tools, ML and Linux Tutorials
Cloud Computing Trends - Penetration Testing Tools, ML and Linux Tutorials
You can consider cloud computing as the backbone of today’s data-driven industries and app-based tech ecosystem. It acts as a bridge between AI and Machine
SuperLink - Social engineering tool
#SuperLink #SocialEngineeringTool #Ngrok
https://reconshell.com/superlink-social-engineering-tool/
#SuperLink #SocialEngineeringTool #Ngrok
https://reconshell.com/superlink-social-engineering-tool/
Penetration Testing Tools, ML and Linux Tutorials
SuperLink - Social engineering tool - Penetration Testing Tools, ML and Linux Tutorials
Social engineering tool for multiple purposes such as locating target's location, webcam access, OS Password grabber
SillyRAT - A Cross Platform multifunctional RAT
#CommandExecution #Payload #RAT #Encryption
https://reconshell.com/sillyrat-a-cross-platform-multifunctional-rat/
#CommandExecution #Payload #RAT #Encryption
https://reconshell.com/sillyrat-a-cross-platform-multifunctional-rat/
Penetration Testing Tools, ML and Linux Tutorials
SillyRAT - A Cross Platform multifunctional RAT - Penetration Testing Tools, ML and Linux Tutorials
A cross platform RAT written in pure Python. The RAT accept commands alongside arguments to either perform as the server who accepts connections or to perform
TmuxRecon - Automate the scanning and enumeration
#TmuxRecon #OSCP #Scanning #Enumeration #Metasploit
https://reconshell.com/tmuxrecon-automate-the-scanning-and-enumeration/
#TmuxRecon #OSCP #Scanning #Enumeration #Metasploit
https://reconshell.com/tmuxrecon-automate-the-scanning-and-enumeration/
Penetration Testing Tools, ML and Linux Tutorials
TmuxRecon - Automate the scanning and enumeration - Penetration Testing Tools, ML and Linux Tutorials
2. C-b w (Move into the TmuxRecon Session).
PowerSnail - PowerShell alternative/restriction bypass
#PowerSnail #PowerShell
https://reconshell.com/powersnail-powershell-alternative-restriction-bypass/
#PowerSnail #PowerShell
https://reconshell.com/powersnail-powershell-alternative-restriction-bypass/
Penetration Testing Tools, ML and Linux Tutorials
PowerSnail - PowerShell alternative/restriction bypass - Penetration Testing Tools, ML and Linux Tutorials
Auto Scan - Automate Auxiliary Module in Metasploit
#Metasploit #AutoScan #Nmap #AuxiliaryModule
https://reconshell.com/auto-scan-automate-auxiliary-module-in-metasploit/
#Metasploit #AutoScan #Nmap #AuxiliaryModule
https://reconshell.com/auto-scan-automate-auxiliary-module-in-metasploit/
PowerShellArmoury – A PowerShell armoury for security
#PowerShell #ps1 #Microsoft #Security
https://reconshell.com/powershellarmoury-a-powershell-armoury-for-security/
#PowerShell #ps1 #Microsoft #Security
https://reconshell.com/powershellarmoury-a-powershell-armoury-for-security/
Penetration Testing Tools, ML and Linux Tutorials
PowerShellArmoury - A PowerShell armoury for security - Penetration Testing Tools, ML and Linux Tutorials
The PowerShell Armoury is meant for pentesters, "insert-color-here"-teamers and everyone else who uses a variety of PowerShell tools during their engagements.