Labs built in docker to cover NSE lessons
☆11Nov 24, 2023Updated 2 years ago
Alternatives and similar repositories for docker-labs
Users that are interested in docker-labs are comparing it to the libraries listed below
Sorting:
- App with Server Side Template Injection (SSTI) vulnerability - possible RCE - in Flask. Free vulnerable app for ethical hacking / penetra…☆16Sep 15, 2022Updated 3 years ago
- If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "…☆22Dec 5, 2018Updated 7 years ago
- A very simple python script to encode and decode PowerShell one-liners.☆25Feb 13, 2022Updated 4 years ago
- Gathers urls from common crawl☆35Nov 9, 2019Updated 6 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- Converts Nmap XML output to csv file, and other useful functions☆94Jun 8, 2023Updated 2 years ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- Scripts to automate RECON process☆11Aug 31, 2025Updated 6 months ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- dotfiles☆11Feb 20, 2026Updated last week
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- MagTool is software for magnetic stripe readers & writers.☆15Jan 22, 2013Updated 13 years ago
- Iot BeeHive Monitoring using Balena.io☆12Mar 7, 2022Updated 3 years ago
- This package allows reading and writing bettercap's session recordings.☆14Apr 8, 2019Updated 6 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- Lot of gnuwin32 tools with aliases in PowerShell☆11Aug 20, 2015Updated 10 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Jan 8, 2023Updated 3 years ago
- Dump iceriver firmware files and filesystem☆10Oct 3, 2023Updated 2 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- Website for breaches.net☆10Nov 9, 2022Updated 3 years ago
- My attempts at making life with VMware that little bit easier.☆11Aug 7, 2023Updated 2 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- Herramienta para spamear correos electrónicos creada con Python y SMTP, se necesita un correo electrónico de Outlook para poder usar la h…☆16May 1, 2023Updated 2 years ago
- Tools and pages to track horizontal issues☆12Feb 8, 2026Updated 2 weeks ago
- All the latest releases and files for x64dbg...☆13Nov 23, 2020Updated 5 years ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆15Jul 19, 2025Updated 7 months ago
- Code for the USB write blocker built on the FTDI VNC2 development board☆10Aug 17, 2021Updated 4 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Parsers for common structures across windows formats.☆12Aug 23, 2023Updated 2 years ago
- Plugin that serves the ATT&CK website alongside CALDERA.☆12Feb 24, 2020Updated 6 years ago
- Plans for DIY nanodrop☆10Oct 18, 2019Updated 6 years ago
- A playground website to learn how different parts of the scrollbar UI can be customized☆11Jun 15, 2025Updated 8 months ago
- Archive for data from mcbroken.com.☆13Updated this week
- All my POC related to malware development☆15Feb 19, 2026Updated last week
- Real time graph generator of the network topology using traceroute, nmap and arborJS☆12Dec 1, 2013Updated 12 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- ☆10Mar 31, 2021Updated 4 years ago