KrustyHack / docker-privilege-escalationLinks
A docker example for privilege escalation
☆25Updated 8 years ago
Alternatives and similar repositories for docker-privilege-escalation
Users that are interested in docker-privilege-escalation are comparing it to the libraries listed below
Sorting:
- OAuth Security Cheatsheet☆41Updated 11 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 7 years ago
- ☆38Updated 5 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 8 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 7 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Updated 7 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 9 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Updated 8 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- An easy to grep dump of the NVD database showing only; CVE-ID, CVSS Risk Score, and Summary.☆56Updated 3 years ago
- Burp Suite extension to track vulnerability assessment progress☆59Updated 5 years ago
- Extension adds a new tab in Burp Suite called Extractor☆42Updated 6 years ago
- ☆25Updated 4 years ago
- A collection of scripts used to interact with the Burp Rest API☆55Updated 6 years ago
- Proof-of-concept CORS exploitation tool.☆35Updated 6 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Updated 8 years ago
- Scans tcl for command injection☆36Updated 6 years ago
- A proof of concept to dump Django website's source code affected by NGINX's off-by-slash alias directive misconfiguration.☆24Updated 3 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Updated 6 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 4 years ago
- Scan for and exploit Consul agents☆39Updated 6 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Updated 3 years ago
- Jaqen - Simple DNS rebinding☆75Updated 7 years ago
- ☆21Updated 6 years ago
- A tool to evaluate Content Security Policies.☆71Updated 5 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Updated 6 years ago