Swordfish-Security / Pentest-In-DockerLinks
Docker image to exploit RCE, try for pentest methods and test container security solutions (trivy, falco and etc.)
☆89Updated 4 years ago
Alternatives and similar repositories for Pentest-In-Docker
Users that are interested in Pentest-In-Docker are comparing it to the libraries listed below
Sorting:
- A lab to play with authentication and authorisation problems☆96Updated 2 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆199Updated 3 weeks ago
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆210Updated 3 years ago
- ☆104Updated 5 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- This repository contain any information that can be used to hack Kubernetes☆105Updated 3 years ago
- Application Security pipelines☆51Updated 3 years ago
- Damn Vulnerable Cloud Application☆193Updated 6 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆174Updated 8 months ago
- Kubolt utility for scanning public kubernetes clusters☆110Updated this week
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆259Updated 2 years ago
- Workshop given at Hack in Paris 2019☆122Updated 2 years ago
- Kubernetes Pwnage for all☆57Updated 4 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆105Updated 4 months ago
- Purposely vulnerable Java application to help lead secure coding workshops☆182Updated last year
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- NotSoCereal: A Deserialization exploit playground☆52Updated 3 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Updated 5 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆182Updated 2 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- Vulnerable SAML infrastructure training applicaiton☆53Updated 2 years ago
- Scan DockerHub images that match a keyword to find secrets.☆59Updated 4 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- ☆127Updated 11 months ago
- ☆148Updated 3 years ago
- ☆249Updated 9 months ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆42Updated last year
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆92Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last month
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆111Updated 3 years ago