Swordfish-Security / Pentest-In-Docker
Docker image to exploit RCE, try for pentest methods and test container security solutions (trivy, falco and etc.)
☆88Updated 4 years ago
Alternatives and similar repositories for Pentest-In-Docker:
Users that are interested in Pentest-In-Docker are comparing it to the libraries listed below
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆194Updated last year
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆198Updated 2 years ago
- A lab to play with authentication and authorisation problems☆95Updated 2 years ago
- ☆104Updated 5 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- Tools to assess the DNS security of web applications☆128Updated 2 years ago
- Workshop given at Hack in Paris 2019☆121Updated last year
- Docker toolbox for pentest of web based application.☆149Updated this week
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆182Updated 2 years ago
- NotSoCereal: A Deserialization exploit playground☆51Updated 3 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆256Updated 2 years ago
- Tool for catching and logging different types of requests.☆220Updated 4 years ago
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆131Updated 4 years ago
- Custom scripts for the PIPER Burp extensions.☆97Updated last year
- This repository contain any information that can be used to hack Kubernetes☆99Updated 2 years ago
- ☆160Updated 3 years ago
- Everything you need about Burp Extension Generation☆152Updated 2 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆91Updated 9 months ago
- Hidden parameters discovery suite☆223Updated 2 years ago
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆104Updated last year
- A Burp Suite Extension for Application Penetration Testing to map flows and vulnerabilities☆117Updated last year
- Prototype Pollution Scanner☆113Updated 3 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆90Updated last year
- ☆44Updated 3 years ago
- Vulnerable SAML infrastructure training applicaiton☆51Updated 2 years ago
- Build your own reconnaissance system with Osmedeus Next Generation☆184Updated last month
- Damn Vulnerable Cloud Application☆192Updated 6 years ago
- Check AWS S3 instances for read/write/delete access☆120Updated 3 years ago
- Enumerate AWS permissions and resources.☆68Updated 2 years ago