catuhub / dockerized-vms
Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.
☆13Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for dockerized-vms
- Create an AMI with CobaltStrike and related tools.☆8Updated 3 months ago
- Python script for privilege escalation for Python☆9Updated 4 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- OpenSSF Project Template☆17Updated 11 months ago
- Standardizing Security Titles☆13Updated last year
- A framework for parsing binary data.☆16Updated 2 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆26Updated last month
- Training scenarios for cyber ranges☆11Updated 4 years ago
- A simple web interface for Nmap with a XML to JSON reports converter☆12Updated 3 years ago
- Libvirt XML Files for Derivative Linux Distributions KVM - https://www.kicksecure.com/wiki/KVM / https://www.whonix.org/wiki/KVM☆8Updated 2 months ago
- vyos based isolation of networks☆11Updated 4 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 6 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆19Updated 2 years ago
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- Linksys Smart Wi-fi X-JNAP-Action Sensitive Information Disclosure for EA8500 router and potentially others☆17Updated 3 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- ☆10Updated 6 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Minimal Docker image with Nmap Network Security Scanner pre-installed.☆10Updated 5 months ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- ☆14Updated 2 months ago
- Ansible based WSL windows developer environment bootstrap☆10Updated 4 months ago
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated 11 months ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 2 years ago
- Code samples to go along with the blog post on how to run code at load/unload time when using LD_PRELOAD to inject libraries.☆11Updated 2 years ago