byt3bl33d3r / dockerxxxLinks
An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵
☆13Updated last year
Alternatives and similar repositories for dockerxxx
Users that are interested in dockerxxx are comparing it to the libraries listed below
Sorting:
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- Legba recipes.☆51Updated last year
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆13Updated 7 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Rubber Ducky powered by NeoKey☆27Updated last year
- Directory with Bluetooth exploits that is used in BlueToolkit☆17Updated last month
- hiding in plain sight: part 2☆45Updated last year
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Updated 7 months ago
- Python3 tool to perform password spraying using RDP☆16Updated 2 years ago
- A C# Tool to gather information about email breaches☆15Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Network Traffic Fuzzer☆18Updated 10 months ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆11Updated 7 months ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Updated 3 years ago
- A Python script to find tenant id an region from a list of domain names.☆15Updated 9 months ago
- Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.☆27Updated 5 years ago
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆15Updated 9 months ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Updated last year
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆27Updated 11 months ago
- ☆27Updated 2 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆18Updated last year
- Free Email Providers☆11Updated 2 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated 2 years ago
- GitHub CVE Repository Hunt☆19Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆28Updated 7 months ago
- AES-256 Microsoft Cryptography API Example Use.☆35Updated 2 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 4 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated 5 months ago