Docker setup for Pupy
☆28Jul 23, 2023Updated 2 years ago
Alternatives and similar repositories for docker-pupy
Users that are interested in docker-pupy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Cloned from now gone Digitalbond page.☆15Aug 23, 2016Updated 9 years ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- MySQL User Defined Functions Exploitation to RCE or PrivEsc Simple Cheat Sheet.☆26May 13, 2022Updated 4 years ago
- ☆13Jan 27, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Scripts for my Pluralsight PowerShell Playbook: Automating Active Directory course☆13Jan 10, 2020Updated 6 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Collection of generic YARA rules☆16Mar 18, 2026Updated 2 months ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- Cloud Templates and scripts to deploy mordor environments☆130Mar 3, 2021Updated 5 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- ☆11Feb 13, 2024Updated 2 years ago
- A little tool to play with Windows security☆12Jan 21, 2026Updated 3 months ago
- ☆13Nov 25, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Dec 30, 2023Updated 2 years ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆145Oct 12, 2020Updated 5 years ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- ☆26Mar 10, 2022Updated 4 years ago
- PoC☆12Apr 7, 2025Updated last year
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆27Dec 13, 2022Updated 3 years ago
- ☆10Oct 29, 2019Updated 6 years ago
- A large repository of links spanning all topics in information security.☆13Mar 18, 2016Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆47Updated this week
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Oct 27, 2023Updated 2 years ago
- GNU IFUNC is the real culprit behind CVE-2024-3094☆57May 9, 2026Updated last week
- XSS平台 CTF工具 Web安全工具☆11Jun 3, 2018Updated 7 years ago
- Simple DLL to test various injection methods.☆52Sep 5, 2020Updated 5 years ago
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 6 years ago
- repository containing some nmap scripts☆16Jan 15, 2021Updated 5 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- a port of privkit bof for havoc☆23Dec 8, 2023Updated 2 years ago
- Microsoft SQL Server Hooking☆20Aug 21, 2013Updated 12 years ago
- Fairy Law - Compromise or disable EDR security solutions☆71Dec 1, 2025Updated 5 months ago
- AppImage bundled version xfreerdp with pass the hash function☆15Apr 17, 2018Updated 8 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 8 years ago
- Modbus stager in assembly and some scripts to upload/download data to the holding register of a PLC☆44Jun 10, 2020Updated 5 years ago