LOLcrawler

For bugbounty and penetration testing/redteaming, a headless web crawler is used Lolcrawler is a headless browser crawler designed for BugBounty and RedTeaming. Be aware that this code is really sluggish, but it should be able to run for several days and uncover some fascinating urls/paths. BeautifulSoup, jsbeautifier, urlextract, and linkfinder.py are among the crawler's methods for attempting to locate links and urls. Due to the headless selenium browser, you'll need to install Docker to run this crawler. Users need to install docker to run this crawler due to the headless selenium browser. Disclaimer: The intended use for the tool is strictly educational…

Continue ReadingLOLcrawler

Kubesploit: Testing Containerized Environments with a New Offensive Tool

This is a full framework dedicated to Kubernetes that will help penetration testers and Red Teamers run a comprehensive and in-depth test to imitate real-life attack scenarios that are a danger to many enterprises across the world. More than 84 percent of enterprises utilise containers in production, and more than 78 percent use Kubernetes as their container orchestration platform, according to a Cloud Native Computing Foundation (CNCF) survey. Because of the technology's widespread adoption, attackers must develop their Kubernetes skills. Key Benefits To assist in the protection of Kubernetes clusters against assaults, we must first understand the technology and the businesses that are being attacked. However, the majority of today's technologies are focused on passively scanning the cluster for vulnerabilities, and there is a lack of coverage for more complicated attack vectors. These tools may allow you to see the problem, but they will not allow you to solve it. It's critical to run the exploit to replicate a real-world attack in order to assess corporate network resilience. When an exploit is launched, the organization's cyber event management is practised, which isn't the case when scanning for cluster concerns. This can assist the business in learning how to respond when real attacks occur, determining whether its other detection systems are functioning properly, and determining what adjustments should be done. New features: The new modules are being created For containerized environment attack vectors such breakout from a container to…

Continue ReadingKubesploit: Testing Containerized Environments with a New Offensive Tool

New Flaws Expose EVlink Electric Vehicle Charging Stations to Remote Hacking

A number of new vulnerabilities have been patched by Schmidt Electric, exposing its EVlink electric vehicle charging stations to remote hacking attacks. In an announcement on December 14, Schneider encouraged…

Continue ReadingNew Flaws Expose EVlink Electric Vehicle Charging Stations to Remote Hacking

KlustAIR Scanner

Submit all images in your #kubernetes cluster to Anchore for a #vulnerability check, and use kubeaudit to double-check your settings. Requirements Python 3 Running Anchore (See docker-compose-anchore.yaml) Disclaimer: - The…

Continue ReadingKlustAIR Scanner

Octovy

For the organization, package a GitHub repository vulnerability scanner. Based on Trivy, a vulnerability management tool for 3rd party OSS products. It functions as a GitHub App, scanning the source code of a repository placed in Trivy's GitHub App. The scan results are saved in the database, and the Web portal allows the developer and security administrator to view and manage vulnerabilities. Features:- Vulnerability detection across the entire organization Management of Vulnerabilities Disclaimer: - The intended use for the tool is strictly educational and should not be…

Continue ReadingOctovy