Swordfish-Security / Pentest-In-DockerLinks
Docker image to exploit RCE, try for pentest methods and test container security solutions (trivy, falco and etc.)
☆89Updated 4 years ago
Alternatives and similar repositories for Pentest-In-Docker
Users that are interested in Pentest-In-Docker are comparing it to the libraries listed below
Sorting:
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆199Updated last month
- A lab to play with authentication and authorisation problems☆96Updated 2 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆105Updated last year
- Docker toolbox for pentest of web based application.☆160Updated this week
- Tools to assess the DNS security of web applications☆128Updated 2 years ago
- Damn Vulnerable Java (EE) Application☆139Updated last year
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆53Updated last month
- Scan DockerHub images that match a keyword to find secrets.☆60Updated 4 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- Workshop given at Hack in Paris 2019☆122Updated 2 years ago
- Damn Vulnerable Cloud Application☆195Updated 6 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- ☆127Updated last year
- Kubolt utility for scanning public kubernetes clusters☆110Updated 3 weeks ago
- A pre-DDoS security assessment tool☆120Updated 4 years ago
- NotSoCereal: A Deserialization exploit playground☆53Updated 3 years ago
- Secrets scanner that understands code☆188Updated last year
- A GraphQL enumeration and extraction tool☆131Updated 2 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆92Updated 2 years ago
- Combined port scanning w/ Masscan's speed & Nmap's scanning features.☆153Updated 3 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆182Updated 2 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆143Updated 2 years ago
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆212Updated 3 years ago
- This repository contain any information that can be used to hack Kubernetes☆108Updated 3 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆122Updated 2 years ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆282Updated 2 years ago
- Find CVE PoCs on GitHub☆147Updated last year