Docker image to exploit RCE, try for pentest methods and test container security solutions (trivy, falco and etc.)
☆94Dec 15, 2020Updated 5 years ago
Alternatives and similar repositories for Pentest-In-Docker
Users that are interested in Pentest-In-Docker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Awesome DevSecOps на русском языке☆346Sep 14, 2023Updated 2 years ago
- An intuitive command-line tool for downloading and unpacking SourceMap files.☆10Oct 18, 2024Updated last year
- docker-compose bringing up multiple vulnerable applications inside containers.☆19Jan 29, 2018Updated 8 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆26Jan 24, 2025Updated last year
- CVE-2020-5902☆10Jul 11, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- PathBuster - multiple hosts Web path scanner☆23Jun 3, 2024Updated last year
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 6 months ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Feb 11, 2025Updated last year
- A collection of tools for the Janus exploit [CVE-2017-13156].☆11Oct 22, 2019Updated 6 years ago
- GitLab CI security tools runner☆18Feb 3, 2023Updated 3 years ago
- ☆47Jun 3, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Go Damn Vulnerable Web App☆24Jul 16, 2024Updated last year
- A tool to test cross-device authentication protocol security☆27Feb 24, 2025Updated last year
- Timeinator is an extension for Burp Suite that can be used to perform timing attacks over an unreliable network such as the internet.☆22May 9, 2023Updated 2 years ago
- ☆28Jun 18, 2019Updated 6 years ago
- Talan CLI (tln) is an open-source framework for managing third-party components from wide range of ecosystems (Java, Node.js, C++, Golang…☆33Updated this week
- ☆13May 12, 2020Updated 5 years ago
- Periodically scan target ranges using nmap, ndiff and emailing changes☆11Jan 13, 2017Updated 9 years ago
- A Model Context Protocol (MCP) server for automating Ludus v1 and v2 cyber range environments through AI assistants. 190+ tools for range…☆77Mar 26, 2026Updated 3 weeks ago
- ☆11Dec 31, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, wor…☆486Dec 13, 2021Updated 4 years ago
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆15Apr 29, 2022Updated 3 years ago
- Small C# caching and cache-filling library, intended as a replacement for memcached in many cases.☆14Apr 28, 2025Updated 11 months ago
- Shellshock exploit + vulnerable environment☆231May 11, 2023Updated 2 years ago
- A Teensy 4 drone synth☆12Jun 9, 2025Updated 10 months ago
- Impacket is a collection of Python classes for working with network protocols.☆17Feb 3, 2026Updated 2 months ago
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆12Jun 12, 2019Updated 6 years ago
- Backend for Nuclear Pond☆20Dec 7, 2023Updated 2 years ago
- This repository contains a proof-of-concept exploit script for CVE-2025-32432, a pre-authentication Remote Code Execution (RCE) vulnerabi…☆24Apr 27, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- yoshimi soft synth for web browsers☆15Oct 2, 2019Updated 6 years ago
- REST API client to consume w3af☆17May 22, 2023Updated 2 years ago
- Reconness Agents Script☆32Jul 25, 2022Updated 3 years ago
- visually see issues with supported cipher suites☆18Jun 18, 2024Updated last year
- Administration and troubleshooting tools inside a docker container☆10May 2, 2023Updated 2 years ago