Labs built in docker to cover NSE lessons
☆11Nov 24, 2023Updated 2 years ago
Alternatives and similar repositories for docker-labs
Users that are interested in docker-labs are comparing it to the libraries listed below
Sorting:
- If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "…☆22Dec 5, 2018Updated 7 years ago
- App with Server Side Template Injection (SSTI) vulnerability - possible RCE - in Flask. Free vulnerable app for ethical hacking / penetra…☆16Sep 15, 2022Updated 3 years ago
- LDAP Injection Vulnerability Application(Blog Sample Code)☆22Oct 4, 2018Updated 7 years ago
- Converts Nmap XML output to csv file, and other useful functions☆94Jun 8, 2023Updated 2 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆58Jun 13, 2024Updated last year
- Anonymous ftp server docker image based on vsftpd, used to serve MetaBrainz files☆50Nov 26, 2020Updated 5 years ago
- Herramienta ideal para obtener una Fully Shell interactiva vía HTTP, sin necesidad de hacer Reverse Shell.☆108Nov 28, 2023Updated 2 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- All the latest releases and files for x64dbg...☆13Nov 23, 2020Updated 5 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- Lot of gnuwin32 tools with aliases in PowerShell☆11Aug 20, 2015Updated 10 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- Lansweeper Password Recovery Tool☆11Jul 2, 2016Updated 9 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- Subdomain finder☆10Mar 13, 2025Updated last year
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Modules created by Nettitude for Metasploit☆12Jun 20, 2018Updated 7 years ago
- An HTTP proxy library for Go☆16Jun 22, 2022Updated 3 years ago
- ☆11May 13, 2024Updated last year
- VM escape (QEMU, VirtualBox, VMware)☆17Mar 21, 2022Updated 4 years ago
- This package allows reading and writing bettercap's session recordings.☆14Apr 8, 2019Updated 6 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Iot BeeHive Monitoring using Balena.io☆12Mar 7, 2022Updated 4 years ago
- DO NOT RUN THIS.☆10Jul 15, 2021Updated 4 years ago
- dotfiles☆11Mar 10, 2026Updated last week
- Powershell script to include in your SharePoint Framework solution which allows having an automated deployment http://www.delucagiuliano.…☆10Jan 12, 2018Updated 8 years ago
- THOR APT Scanner User Manual☆20Mar 9, 2026Updated last week
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- ☆15May 17, 2018Updated 7 years ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 10 months ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago