Swordfish-Security / Pentest-In-DockerLinks
Docker image to exploit RCE, try for pentest methods and test container security solutions (trivy, falco and etc.)
☆90Updated 4 years ago
Alternatives and similar repositories for Pentest-In-Docker
Users that are interested in Pentest-In-Docker are comparing it to the libraries listed below
Sorting:
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆201Updated 3 months ago
- Damn Vulnerable Java (EE) Application☆141Updated last year
- Damn Vulnerable Cloud Application☆198Updated 6 years ago
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆104Updated 2 years ago
- A lab to play with authentication and authorisation problems☆96Updated 2 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- Find CVE PoCs on GitHub☆151Updated last month
- Purposely vulnerable Java application to help lead secure coding workshops☆185Updated last year
- Tools to assess the DNS security of web applications☆128Updated 2 years ago
- Workshop given at Hack in Paris 2019☆123Updated 2 years ago
- Scan DockerHub images that match a keyword to find secrets.☆60Updated 4 years ago
- ☆127Updated last year
- Finding exposed secrets and personal data in GitLab☆199Updated 9 months ago
- Combined port scanning w/ Masscan's speed & Nmap's scanning features.☆154Updated 3 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- ☆104Updated 5 years ago
- A pre-DDoS security assessment tool☆120Updated 4 years ago
- Secrets scanner that understands code☆188Updated last year
- Docker toolbox for pentest of web based application.☆166Updated last week
- Docker image for Osmedeus, a fully automated offensive security tool for reconnaissance and vulnerability scanning☆105Updated 2 weeks ago
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆57Updated 3 months ago
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆219Updated 3 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆262Updated 2 years ago
- Tools to assess DNS security.☆152Updated last year
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆284Updated 2 years ago
- Build your own reconnaissance system with Osmedeus Next Generation☆197Updated 3 weeks ago
- The Burp extension to check JWT (JSON Web Tokens) for using keys from known from public sources☆135Updated 4 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆91Updated 2 years ago
- This is a dockerized application that is vulnerable to the Spring4Shell vulnerability (CVE-2022-22965).☆107Updated 3 years ago