-
Redis-Server-Exploit
This will give you shell access on the target system if redis server is not configured properly and faced on the internet without any authentication
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
Another approach consists of creating rogue SSH access with tools like Redis-Server-Exploit.
Some CTFs, like [this one](https://github.com/jmau111/htb-dirty-scripts/tree/main/shared], emulate that attack.
Even if the instance uses a different port, frameworks such as Metasploit include specific modules to automate enumeration.
NOTE:
The number of mentions on this list indicates mentions on common posts plus user suggested alternatives.
Hence, a higher number means a more popular project.
Related posts
-
Cloud Security and Resilience: DevSecOps Tools and Practices
-
A Deep Dive Into Terraform Static Code Analysis Tools: Features and Comparisons
-
SQLite virtual table to query operating system data via SQL
-
Show HN: Natural Language to SQL "Text-to-SQL" API by Dataherald
-
Best Hacking Tools for Beginners 2024