☆12Oct 15, 2024Updated last year
Alternatives and similar repositories for dockerBuilds
Users that are interested in dockerBuilds are comparing it to the libraries listed below
Sorting:
- Materials for AWS Training☆15Jul 21, 2021Updated 4 years ago
- ☆14Jan 25, 2022Updated 4 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Automation framework for attack-defense CTFs.☆16Nov 22, 2019Updated 6 years ago
- A more obfuscated CactusTorch targeted towards office☆31Feb 4, 2021Updated 5 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated last year
- Less sugar (entropy) for your binaries☆34Sep 10, 2025Updated 5 months ago
- SubZone - Subdomains, Dns records, & more! || Python tutorial || Certificate authority abuse || Adavnced || Hacking/Info-Sec ||☆43Apr 3, 2025Updated 10 months ago
- ☆20Aug 11, 2024Updated last year
- ☆20Feb 22, 2021Updated 5 years ago
- Identify Azure AD resources that issue tokens without MFA enforcement using the ROPC grant flow.☆83Feb 2, 2026Updated 3 weeks ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Mass target enumeration☆32Apr 3, 2021Updated 4 years ago
- S3 bucket enumerator☆30Apr 7, 2019Updated 6 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- ☆10Updated this week
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- Artifact monitoring that ensures fairplay☆78Jan 29, 2025Updated last year
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆35Dec 1, 2025Updated 2 months ago
- A Cobaltstrike container, built for Warhorse☆40Aug 8, 2024Updated last year
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Jan 3, 2020Updated 6 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- This repo is dedicated to a powerpoint exploit☆34Dec 11, 2020Updated 5 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- Quick and dirty dynamic redirect.rules generator☆169Oct 12, 2022Updated 3 years ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- ☆16Jul 8, 2024Updated last year
- A tool to create randomly insecure file shares that also contain unsecured credential files☆48Feb 16, 2026Updated last week
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- ☆11May 8, 2022Updated 3 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- blame Huy☆42Jan 3, 2021Updated 5 years ago