Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)
☆25Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for docker-binaryexploitation
Users that are interested in docker-binaryexploitation are comparing it to the libraries listed below
Sorting:
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- ☆19Aug 2, 2020Updated 5 years ago
- ☆12Jan 31, 2020Updated 6 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 9 months ago
- Next Generation of White Chapel☆21Oct 17, 2014Updated 11 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- ☆11Aug 18, 2023Updated 2 years ago
- Windows 10 Live Information viewer☆38Jan 27, 2022Updated 4 years ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Jun 5, 2025Updated 9 months ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 9 months ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- ☆66Jan 4, 2020Updated 6 years ago
- BinjaryNinja plugin for a ShellStorm like assembly/disassembly experience☆17Nov 28, 2024Updated last year
- Follow all members of a list☆12Dec 20, 2021Updated 4 years ago
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- autocrack adds queue support for hashcat cracking.☆41Mar 16, 2023Updated 3 years ago
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆14May 3, 2024Updated last year
- Small easy to find cheat sheet for Active directory exploitation☆44Jul 9, 2020Updated 5 years ago
- Nagios XI 5.5.6 Remote Code Execution and Privilege Escalation☆14Aug 14, 2020Updated 5 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- ☆97Feb 18, 2025Updated last year
- CERTITUDE - A python package to classify malicious URLs☆20May 16, 2022Updated 3 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- ☆16Mar 9, 2026Updated last week
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆12Mar 8, 2022Updated 4 years ago
- A code skeleton of Samsung's Shannon5123 5G baseband modem.☆20May 6, 2020Updated 5 years ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- ☆70Oct 30, 2023Updated 2 years ago
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- ☆14Mar 19, 2024Updated 2 years ago
- ☆13Apr 5, 2015Updated 10 years ago
- The purpose of this learning collection is to provide links to get you started on the journey of AI security.☆10Oct 24, 2025Updated 4 months ago
- Open KLara Project☆36Feb 12, 2026Updated last month
- ☆19Sep 21, 2020Updated 5 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago