AbsoZed / DockerPwn.pyLinks
Python automation of Docker.sock abuse
☆211Updated 3 years ago
Alternatives and similar repositories for DockerPwn.py
Users that are interested in DockerPwn.py are comparing it to the libraries listed below
Sorting:
- BlueKeep scanner supporting NLA☆167Updated 6 years ago
- vulnerable single sign on☆150Updated last year
- DupeKeyInjector☆135Updated 3 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆297Updated 6 years ago
- an asynchronous target enumeration tool☆245Updated 3 years ago
- a CLI for ephemeral penetration testing☆16Updated 6 years ago
- PoC for CVE-2018-1002105.☆222Updated 7 years ago
- Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]☆371Updated 6 years ago
- nray distributed port scanner☆158Updated 7 months ago
- A collection of useful Serverless functions I use when pentesting☆391Updated 3 years ago
- Linux Privilege Escalation Tool☆186Updated 6 years ago
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆125Updated 7 years ago
- JWT Fuzzer for BurpSuite. Adds an Intruder hook for on-the-fly JWT fuzzing.☆100Updated 6 years ago
- Some scripts and exploits☆147Updated 7 years ago
- Pentest/BugBounty progress control with scanning modules☆282Updated 5 years ago
- ☆208Updated 4 years ago
- ☆232Updated 6 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 6 years ago
- An exploit for Apache Struts CVE-2018-11776☆303Updated 7 years ago
- Linux Local Privesc Helper and Agent☆166Updated 6 years ago
- Search Exploitable Software on Linux☆234Updated 2 years ago
- Simple python script to extract unsafe functions from php projects☆196Updated 7 years ago
- Everything you need about Burp Extension Generation☆157Updated 3 years ago
- Linux post exploitation privilege escalation enumeration☆259Updated 5 years ago
- Sample vulnerable code and its exploit code☆190Updated 4 years ago
- Public work for CVE-2019-0708☆291Updated 6 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆239Updated 3 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆246Updated 4 years ago
- Collection of things made during my preparation to take on OSCE☆189Updated 3 years ago
- Hawkeye filesystem analysis tool☆242Updated 7 years ago