byt3bl33d3r / dockerxxx
An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵
☆13Updated last year
Alternatives and similar repositories for dockerxxx:
Users that are interested in dockerxxx are comparing it to the libraries listed below
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year
- Database for custom made as well as publicly available stage-2 or beacons or stageless payloads, used by loaders/stage-1/stagers, or for …☆11Updated last month
- Fuzz Network Traffic☆18Updated 3 months ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆13Updated last year
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆13Updated 10 months ago
- Rubber Ducky powered by NeoKey☆22Updated 9 months ago
- Legba recipes.☆48Updated 7 months ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 10 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- LSASS Credential Dumper that utilizes the Windows API, in-memory RC4 encryption and Base64 encoding, and HTTPS exfiltration.☆10Updated last year
- ☆10Updated 4 months ago
- ☆12Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated 2 months ago
- Seven different DLL injection techniques in one single project.☆10Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Recon-ng modules for basic OSINT.☆11Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆11Updated last year
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆14Updated last month
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- A C# Tool to gather information about email breaches☆14Updated last year
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 5 years ago
- Free Email Providers☆10Updated last year