catuhub / dockerized-vms
Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.
☆14Updated 4 years ago
Alternatives and similar repositories for dockerized-vms:
Users that are interested in dockerized-vms are comparing it to the libraries listed below
- OpenSSF Project Template☆18Updated last year
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- Dockerized cve-search as a web app☆16Updated 7 years ago
- Python script for privilege escalation for Python☆11Updated 4 years ago
- Docker Security Playground official repository☆1Updated 2 months ago
- Libvirt XML Files for Derivative Linux Distributions KVM - https://www.kicksecure.com/wiki/KVM / https://www.whonix.org/wiki/KVM☆9Updated 2 weeks ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- vyos based isolation of networks☆10Updated 4 years ago
- masscan result parsing, web server fingerprinting☆19Updated 2 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated last year
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Updated 4 months ago
- Create an AMI with CobaltStrike and related tools.☆10Updated this week
- My attempt at writing exploit POCs for various CVEs☆16Updated 5 years ago
- Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs,…☆20Updated last month
- A framework for parsing binary data.☆17Updated 2 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- ☆6Updated 8 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 5 years ago
- Collection Of Scripts And Utilities For Windows Event Hunting☆18Updated 5 years ago
- Docker container for running OWASP WebGoat.NET application☆11Updated 6 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- A utility to decrypt and retrieve encrypted data (either cookies or login credentials) from Chromium SQLite databases.☆10Updated last year
- A vizualization tool for data generated by the bal framework☆11Updated 2 years ago
- Some stuff about telecom security☆14Updated 9 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 3 years ago
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 4 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Automated Security Risk Identification Using AutomationML-based Engineering Data☆28Updated 2 years ago
- Cryptanalysis and attack library☆22Updated 3 years ago