Docker image to exploit RCE, try for pentest methods and test container security solutions (trivy, falco and etc.)
☆94Dec 15, 2020Updated 5 years ago
Alternatives and similar repositories for Pentest-In-Docker
Users that are interested in Pentest-In-Docker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Awesome DevSecOps на русском языке☆347Sep 14, 2023Updated 2 years ago
- Extract metadata with SSRF (Server-Side Request Forgery)☆16Jul 23, 2022Updated 3 years ago
- An intuitive command-line tool for downloading and unpacking SourceMap files.☆10Oct 18, 2024Updated last year
- Перевод BSIMM (https://www.bsimm.com) на русский язык☆23Dec 2, 2022Updated 3 years ago
- A Django vulnerable Web application for testing the w3af framework☆32Jul 6, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PathBuster - multiple hosts Web path scanner☆23Jun 3, 2024Updated last year
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- Material of my graduation☆10Mar 13, 2026Updated last month
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Feb 11, 2025Updated last year
- A collection of tools for the Janus exploit [CVE-2017-13156].☆11Oct 22, 2019Updated 6 years ago
- GitLab CI security tools runner☆18Feb 3, 2023Updated 3 years ago
- ☆47Jun 3, 2020Updated 5 years ago
- Go Damn Vulnerable Web App☆24Jul 16, 2024Updated last year
- ☆15Aug 31, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Timeinator is an extension for Burp Suite that can be used to perform timing attacks over an unreliable network such as the internet.☆22May 9, 2023Updated 3 years ago
- ☆28Jun 18, 2019Updated 6 years ago
- Talan CLI (tln) is an open-source framework for managing third-party components from wide range of ecosystems (Java, Node.js, C++, Golang…☆33Apr 15, 2026Updated 3 weeks ago
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆112Jan 4, 2024Updated 2 years ago
- ☆13May 12, 2020Updated 5 years ago
- Useful set of cheatsheets to use for security-oriented people☆22Nov 26, 2019Updated 6 years ago
- Tasks from CTFZone 2017 quals☆12Jul 19, 2017Updated 8 years ago
- 安卓activity劫持演示demo,包含指定activity位于前台时的劫持和指定进程位于前台时的劫持☆15Dec 20, 2018Updated 7 years ago
- Looper using wad.js☆14Mar 2, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Extract data from a .git directory.☆15Mar 28, 2023Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Feb 3, 2026Updated 3 months ago
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆12Jun 12, 2019Updated 6 years ago
- This repository contains a proof-of-concept exploit script for CVE-2025-32432, a pre-authentication Remote Code Execution (RCE) vulnerabi…☆24Apr 27, 2025Updated last year
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- REST API client to consume w3af☆17May 22, 2023Updated 2 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- visually see issues with supported cipher suites☆18Jun 18, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Administration and troubleshooting tools inside a docker container☆10May 2, 2023Updated 3 years ago
- My thesis of me and my friend. Subject for Android security☆14Sep 19, 2019Updated 6 years ago
- POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.☆35Jul 4, 2024Updated last year
- Understanding Linux Kernel Vulnerability☆23Jan 9, 2018Updated 8 years ago
- POC in order to materialize CSRF prevention concepts described in the following OWASP CSRF cheatsheet☆30May 25, 2017Updated 8 years ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- Multi-functional Web Recon & Vulnerability Scanner Tool☆35May 2, 2022Updated 4 years ago