catuhub / dockerized-vmsLinks
Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.
☆14Updated 4 years ago
Alternatives and similar repositories for dockerized-vms
Users that are interested in dockerized-vms are comparing it to the libraries listed below
Sorting:
- Dockerized cve-search as a web app☆16Updated 7 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- ☆27Updated 4 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 9 months ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- A utility to decrypt and retrieve encrypted data (either cookies or login credentials) from Chromium SQLite databases.☆11Updated last year
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆15Updated 2 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago
- A tool for recover router password☆30Updated 7 years ago
- Cryptanalysis and attack library☆23Updated 3 years ago
- Migrate team-managed project issues between two JIRA Cloud accounts☆11Updated 9 months ago
- Nmap NSE script to identify Debian, Ubuntu, FreeBSD version based on default SSH banner response. Intended for Penentration Testing, OSC…☆33Updated last week
- Python script for privilege escalation for Python☆11Updated 5 years ago
- Cloud metadata extraction tools and scripts☆34Updated 2 years ago
- ADB Download All Files - A dirty shell script to adb pull all readable files using adb pull & base64☆25Updated 4 years ago
- ☆16Updated 8 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 8 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 5 years ago
- Simplified NAT Slipstream server and client☆22Updated 4 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆15Updated last year
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- Minimalistic DNS logging tool☆44Updated 3 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆23Updated 8 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago