byt3bl33d3r / dockerxxxLinks
An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵
☆13Updated last year
Alternatives and similar repositories for dockerxxx
Users that are interested in dockerxxx are comparing it to the libraries listed below
Sorting:
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆14Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆12Updated last year
- Rubber Ducky powered by NeoKey☆25Updated last year
- Database for custom made as well as publicly available stage-2 or beacons or stageless payloads, used by loaders/stage-1/stagers, or for …☆10Updated 4 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆24Updated 5 months ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Legba recipes.☆50Updated 9 months ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆13Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 3 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆19Updated 4 months ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆40Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆12Updated 3 years ago
- ☆13Updated 5 months ago
- Malware Libraries focused in help Malware Development☆23Updated 2 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated 10 months ago
- This repository contains tips, tricks, and examples of aggressor script functions. The intent is to share bite size examples that can be …☆12Updated 3 years ago
- Our fork of Iceman's fork for Proxmark III☆16Updated 5 months ago
- Fuzz Network Traffic☆18Updated 5 months ago