byt3bl33d3r / dockerxxx
An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵
☆13Updated last year
Alternatives and similar repositories for dockerxxx:
Users that are interested in dockerxxx are comparing it to the libraries listed below
- Database for custom made as well as publicly available stage-2 or beacons or stageless payloads, used by loaders/stage-1/stagers, or for …☆11Updated last week
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆13Updated 9 months ago
- ST25TB / SRx NFC Emulator / Initiator - kameleon - based on TI TRF7970A with MSP430☆12Updated 6 months ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆16Updated 3 weeks ago
- LSASS Credential Dumper that utilizes the Windows API, in-memory RC4 encryption and Base64 encoding, and HTTPS exfiltration.☆9Updated last year
- Data EXfiltration TestER☆21Updated 5 years ago
- Tools for attacking various MIFARE RFID cards☆14Updated 5 years ago
- A custom SentinelOne USB scanner.☆18Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆10Updated last year
- ☆12Updated 2 years ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆13Updated last year
- Legba recipes.☆44Updated 6 months ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated last year
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Free Email Providers☆10Updated last year
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆34Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- ☆12Updated last month
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- Rubber Ducky powered by NeoKey☆22Updated 8 months ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- A collection of my presentation materials.☆16Updated 9 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago