byt3bl33d3r / dockerxxx
An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵
☆13Updated last year
Alternatives and similar repositories for dockerxxx:
Users that are interested in dockerxxx are comparing it to the libraries listed below
- Database for custom made as well as publicly available stage-2 or beacons or stageless payloads, used by loaders/stage-1/stagers, or for …☆10Updated 2 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Fuzz Network Traffic☆18Updated 3 months ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- ☆14Updated 3 years ago
- Rubber Ducky powered by NeoKey☆22Updated 10 months ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated last year
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- 「🚪」The hidden hookless backdoor☆12Updated 4 months ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆15Updated 3 years ago
- My Own VirtualAlloc Implementation to use as alternative unknown for all the defense solutions of VirtualAlloc Win32 API Function☆8Updated last year
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- Automated Penetration Testing☆14Updated 4 years ago
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Updated 3 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆15Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆11Updated last year
- ☆12Updated 2 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆40Updated 2 years ago
- A Ruby micro-framework for writing and running exploit payloads☆22Updated 2 months ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- ☆13Updated last year
- Free Email Providers☆10Updated last year
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆18Updated 2 months ago
- ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++…☆15Updated last year