aviat / passe-partoutLinks
Passe Partout dumps cryptographic keys from running processes. It is useful to extract private ssh keys from ssh agent.
☆27Updated 9 years ago
Alternatives and similar repositories for passe-partout
Users that are interested in passe-partout are comparing it to the libraries listed below
Sorting:
- Testing/collecting some container breakouts☆94Updated 5 years ago
- SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels☆110Updated 6 years ago
- Competition Infrastructure Management☆87Updated 3 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- Tools I wrote for personal use in C, Python, Powershell, Bash, ...☆46Updated 6 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated 2 years ago
- SNIcat☆126Updated 3 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago
- A beginner-friendly CTF about Kubernetes security.☆78Updated 2 years ago
- A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆88Updated 3 months ago
- Scapy hands-on at #GreHack17☆16Updated 7 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆135Updated 9 months ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- egrets monitors egress☆46Updated 5 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆87Updated 7 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆111Updated 5 years ago
- CERT Tapioca for MITM network analysis☆183Updated last year
- Exfiltrate files via DNS☆96Updated 11 years ago
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 5 years ago
- XFLTReaT tunnelling framework☆329Updated 5 years ago
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 5 years ago
- Ed is a tool used to identify and exploit accessible UNIX Domain Sockets☆27Updated 6 years ago
- Continuous Integration and Development ExploiteR☆86Updated 2 years ago
- Tool to extract Kerberos tickets from Linux kernel keys.☆228Updated 6 years ago
- MSR Project Freta☆77Updated 11 months ago
- Replay RDP traffic from PCAP☆197Updated 6 years ago
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆94Updated last year
- ☆27Updated 2 months ago