byt3bl33d3r / dockerxxxLinks
An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵
☆13Updated last year
Alternatives and similar repositories for dockerxxx
Users that are interested in dockerxxx are comparing it to the libraries listed below
Sorting:
- Database for custom made as well as publicly available stage-2 or beacons or stageless payloads, used by loaders/stage-1/stagers, or for …☆10Updated 5 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- Legba recipes.☆50Updated 10 months ago
- Our fork of Iceman's fork for Proxmark III☆16Updated 7 months ago
- AES-256 Microsoft Cryptography API Example Use.☆31Updated last year
- A utility to fetch and display dns names from the SSL/TLS cert data☆13Updated last year
- Fuzz Network Traffic☆18Updated 6 months ago
- Rubber Ducky powered by NeoKey☆25Updated last year
- x86_64 LKM linux rootkit☆16Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated 11 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆12Updated 2 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated 7 months ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆14Updated last year
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Directory with Bluetooth exploits that is used in BlueToolkit☆15Updated 3 weeks ago
- Enumeration & fingerprint tool☆25Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Gadget IoC removal from HAK5's BashBunny☆20Updated last year
- 「🚪」The hidden hookless backdoor☆13Updated 7 months ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆16Updated 3 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆22Updated 5 months ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆49Updated 4 years ago
- A script to automate keystrokes through a graphical desktop program.☆35Updated last month