catuhub / dockerized-vms
Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.
☆13Updated 4 years ago
Alternatives and similar repositories for dockerized-vms:
Users that are interested in dockerized-vms are comparing it to the libraries listed below
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆14Updated 2 months ago
- OpenSSF Project Template☆17Updated last year
- Training scenarios for cyber ranges☆11Updated 4 years ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 11 months ago
- Create an AMI with CobaltStrike and related tools.☆8Updated last month
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆14Updated 2 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- ☆17Updated 6 years ago
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆14Updated last year
- vyos based isolation of networks☆11Updated 4 years ago
- Linksys Smart Wi-fi X-JNAP-Action Sensitive Information Disclosure for EA8500 router and potentially others☆19Updated 3 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆31Updated 3 years ago
- Python script for privilege escalation for Python☆10Updated 4 years ago
- Useful scripts I have made for pentests. (nothing pretty)☆9Updated last year
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated last year
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 4 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- cool dockerfiles☆12Updated 8 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- A framework for parsing binary data.☆16Updated 2 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆17Updated 3 years ago
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- A vizualization tool for data generated by the bal framework☆11Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- ☆6Updated 8 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆36Updated last year
- Lazily wraps various Linux system auditing tools☆17Updated last year
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago