broxy
kubesploit
Our great sponsors
broxy | kubesploit | |
---|---|---|
1 | 23 | |
990 | 1,071 | |
- | 1.7% | |
1.8 | 0.0 | |
about 2 years ago | about 1 year ago | |
Go | Go | |
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
broxy
-
How to know if our data are not sent to the developers without our knowing?
For the first step, they can use one of these applications: Burp Suite, Wireshark, Charles, Proxyman, Proxie, Packet Peeper, Broxy, Packet Proxy, among others.
kubesploit
-
Trends at Blackhat Asia 2022
Kubesploit
- 🔥🔥 A new version 0.1.3 released for Kubesploit: a post-exploitation framework for Kubernetes🔥🔥
-
New release of 🔥Kubesploit v0.1.3🔥
You can find it here: https://github.com/cyberark/kubesploit
- cyberark/kubesploit - Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
- Kubesploit: Cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments.
- Kubesploit: A new cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments
- 🔥 Kubesploit: A new post-exploitation framework for Kubernetes and containers 🔥
What are some alternatives?
Modlishka - Modlishka. Reverse Proxy.
WeaponizeKali.sh - Automate installation of extra pentest tools on Kali Linux
PacketProxy - A local proxy written in Java
ligolo-ng - An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Proxyman - Modern. Native. Delightful Web Debugging Proxy for macOS, iOS, and Android ⚡️
v2ray-core - A platform for building proxies to bypass network restrictions.
packj - Packj stops :zap: Solarwinds-, ESLint-, and PyTorch-like attacks by flagging malicious/vulnerable open-source dependencies ("weak links") in your software supply-chain
reverse-ssh - Statically-linked ssh server with reverse shell functionality for CTFs and such
sliver - Adversary Emulation Framework
skipper - An HTTP router and reverse proxy for service composition, including use cases like Kubernetes Ingress
combobulator - Dependency Combobulator