A docker example for privilege escalation
☆25Jul 17, 2017Updated 8 years ago
Alternatives and similar repositories for docker-privilege-escalation
Users that are interested in docker-privilege-escalation are comparing it to the libraries listed below
Sorting:
- An Intro to Penetration Testing Workshop☆15May 31, 2018Updated 7 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Azure Offensive Library☆17Oct 18, 2025Updated 4 months ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Useful windows tools for Blue, Red & Purple teams☆11Updated this week
- Slightly modified version of https://raw.githubusercontent.com/killswitch-GUI/CobaltStrike-ToolKit/master/HTTPsC2DoneRight.sh☆12Nov 16, 2017Updated 8 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 5 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- ☆15Apr 12, 2018Updated 7 years ago
- A simple BOF that disables some logging with NtSetInformationProcess☆13Oct 13, 2023Updated 2 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆13Jan 15, 2025Updated last year
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- ☆20Nov 1, 2022Updated 3 years ago
- ☆65May 26, 2016Updated 9 years ago
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP …☆11Nov 3, 2020Updated 5 years ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- Script for pentest☆39Oct 14, 2020Updated 5 years ago
- Scripts that we use for pentesting☆42Feb 24, 2017Updated 9 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Apr 22, 2018Updated 7 years ago
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- Scripts and One-Liners☆20Jan 31, 2025Updated last year
- ☆16Apr 17, 2021Updated 4 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 2 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Malsys is a project designed to validate and analyze files for potential malware signatures.☆21Nov 5, 2023Updated 2 years ago