catuhub / dockerized-vmsLinks
Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.
☆14Updated 5 years ago
Alternatives and similar repositories for dockerized-vms
Users that are interested in dockerized-vms are comparing it to the libraries listed below
Sorting:
- Scripts to clone CA certificates for use in HTTPS client attacks.☆35Updated 5 years ago
- Dockerized cve-search as a web app☆16Updated 8 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆59Updated 4 years ago
- Migrate team-managed project issues between two JIRA Cloud accounts☆11Updated last year
- Python script for privilege escalation for Python☆11Updated 5 years ago
- A tool for recover router password☆33Updated 7 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 8 years ago
- Tools for hunting security threats☆12Updated 6 years ago
- ☆28Updated 4 years ago
- Nmap NSE script to identify Debian, Ubuntu, FreeBSD version based on default SSH banner response. Intended for Penentration Testing, OSC…☆33Updated 3 weeks ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆18Updated 4 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 6 years ago
- Linksys Smart Wi-fi X-JNAP-Action Sensitive Information Disclosure for EA8500 router and potentially others☆21Updated 4 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆47Updated 2 weeks ago
- Faraday's Command Line Interface☆51Updated 2 weeks ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 6 years ago
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆15Updated 2 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Updated last year
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- Get clients and access points.☆48Updated 6 years ago
- Cloud metadata extraction tools and scripts☆34Updated 2 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Updated 3 years ago
- Scapy tools and scripts☆20Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 5 years ago
- Standardizing Security Titles☆13Updated last month
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆25Updated 4 years ago