Launch a fresh docker container per SSH connection
β50Oct 18, 2023Updated 2 years ago
Alternatives and similar repositories for docker-tcp-switchboard
Users that are interested in docker-tcp-switchboard are comparing it to the libraries listed below
Sorting:
- Git CTF π© Can you get on the leaderboards?β12Dec 23, 2020Updated 5 years ago
- A collection of tools for firebase realtime db vulnerability discoveryβ12May 22, 2023Updated 2 years ago
- β14Jan 24, 2016Updated 10 years ago
- Chrome extension to extend github capabilitiesβ14May 19, 2020Updated 5 years ago
- Managing Software Developers - An e-book on how to manage engineering teamsβ20Jan 3, 2019Updated 7 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.β44Feb 10, 2026Updated last month
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minionβ18Mar 3, 2021Updated 5 years ago
- A repository teaching bss/data segment exploitation techniques.β13Aug 11, 2019Updated 6 years ago
- β13Dec 30, 2024Updated last year
- Library for shellcode injectionβ16Mar 21, 2025Updated 11 months ago
- My Payload Collection (XSS,SQL ...)β14Jul 17, 2018Updated 7 years ago
- Hello World examples in assembly, for use as templates.β12Jan 18, 2026Updated 2 months ago
- β24Feb 14, 2024Updated 2 years ago
- Network Forensics Workshop Filesβ17Apr 21, 2015Updated 10 years ago
- Malware analysis toolβ22Apr 27, 2025Updated 10 months ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloadsβ¦β16Nov 29, 2016Updated 9 years ago
- Python-based cloud node for local useβ11Mar 7, 2018Updated 8 years ago
- A mail reflector written in Python with modules for SPF, DKIM and DMARC authentication, used as a test system for testing correspondent'sβ¦β13Sep 15, 2016Updated 9 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentialsβ40Nov 13, 2018Updated 7 years ago
- Download m3u8 videoβ10Aug 31, 2020Updated 5 years ago
- Improved version of David Elliott's SerialKDPProxyβ23Mar 19, 2019Updated 7 years ago
- Website for draco, the OverTheWire warzoneβ12Sep 7, 2015Updated 10 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.β17Aug 2, 2019Updated 6 years ago
- A cryptographic crib maniplation toolβ20Aug 16, 2025Updated 7 months ago
- Abusing fts3_tokenizerβ12Jan 18, 2016Updated 10 years ago
- Documentation for IPinfo official client libraries and integrationsβ16Jul 23, 2025Updated 7 months ago
- Definitely not for fuzzingβ11Oct 22, 2020Updated 5 years ago
- A go implementation of metrics reporting for Circonusβ12Sep 23, 2025Updated 5 months ago
- γγγγζΈγγctfγ©γ€γγ’γγβ17May 11, 2020Updated 5 years ago
- A small library that help CTFer quickly write payloadβ24Jun 19, 2019Updated 6 years ago
- Example code from https://www.joeshaw.org/abusing-go-linkname-to-customize-tls13-cipher-suites/β10Jun 11, 2020Updated 5 years ago
- xkcd style password generator for iOSβ12Oct 24, 2019Updated 6 years ago
- π Go-Observe: A command line Mozilla Observatory client written in Goβ12Feb 9, 2017Updated 9 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"β26Feb 27, 2017Updated 9 years ago
- Build a statically-linked musl toolchain via an npm module.β11Nov 3, 2023Updated 2 years ago
- Copy the image to the Clipboard in Base64 format.β14Apr 10, 2014Updated 11 years ago
- Pragmatic Network Security for Cloud and Hybrid Networksβ10Nov 24, 2015Updated 10 years ago
- β29May 9, 2022Updated 3 years ago
- Parse and stringify file paths with line and column like `unicorn.js14`β24Nov 22, 2025Updated 3 months ago