KrustyHack / docker-privilege-escalationLinks
A docker example for privilege escalation
☆25Updated 8 years ago
Alternatives and similar repositories for docker-privilege-escalation
Users that are interested in docker-privilege-escalation are comparing it to the libraries listed below
Sorting:
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Updated 7 years ago
- ☆38Updated 5 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- OAuth Security Cheatsheet☆40Updated 11 years ago
- ☆13Updated 7 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- An Intro to Penetration Testing Workshop☆15Updated 7 years ago
- A collection of scripts used to interact with the Burp Rest API☆52Updated 6 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- CTF Writeups☆26Updated 5 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 7 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆46Updated 8 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated 9 months ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Extension adds a new tab in Burp Suite called Extractor☆42Updated 6 years ago
- Generate pentest reports based on github issues.☆16Updated 2 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago
- Jaqen - Simple DNS rebinding☆75Updated 7 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 7 years ago
- ☆25Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- Docker Version of Aquatone☆14Updated 7 years ago
- An easy to grep dump of the NVD database showing only; CVE-ID, CVSS Risk Score, and Summary.☆55Updated 3 years ago
- Useful Windows and AD tools☆15Updated 3 years ago