catuhub / dockerized-vmsLinks
Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.
☆14Updated 4 years ago
Alternatives and similar repositories for dockerized-vms
Users that are interested in dockerized-vms are comparing it to the libraries listed below
Sorting:
- Dockerized cve-search as a web app☆16Updated 7 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- test SSL/TLS clients how secure they are☆26Updated 4 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆22Updated 3 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆35Updated 5 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 6 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 8 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago
- Linksys Smart Wi-fi X-JNAP-Action Sensitive Information Disclosure for EA8500 router and potentially others☆21Updated 4 years ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆23Updated 4 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Updated 12 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆59Updated 3 years ago
- Simplified NAT Slipstream server and client☆22Updated 5 years ago
- Python script for privilege escalation for Python☆11Updated 5 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 4 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Updated 5 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Updated 11 months ago
- ☆17Updated 4 years ago
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆14Updated 2 years ago
- Parse nmap scan data with Perl (official repo)☆38Updated 6 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago
- Passive-Recursive DNS daemon☆26Updated last year
- Migrate team-managed project issues between two JIRA Cloud accounts☆11Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Carving tool based in Radare2 & Yara☆16Updated 7 years ago
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- Modified cryptsetup to enable password guessing - https://diverto.github.io/2019/11/18/Cracking-LUKS-passphrases☆17Updated 6 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago