Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)
☆25Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for docker-binaryexploitation
Users that are interested in docker-binaryexploitation are comparing it to the libraries listed below
Sorting:
- Some stuff for PHD2021☆14May 21, 2025Updated 9 months ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Windows 10 Live Information viewer☆38Jan 27, 2022Updated 4 years ago
- ☆21Feb 20, 2014Updated 12 years ago
- ☆19Aug 2, 2020Updated 5 years ago
- A curated list of resources for Cyber Professionals☆16Dec 27, 2020Updated 5 years ago
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- Vagrant file and scripting for easy, disposable Kali Linux virtualization☆23Nov 8, 2019Updated 6 years ago
- My walkthrough of the LPEWorkshop exercises☆36Aug 17, 2020Updated 5 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Nov 11, 2021Updated 4 years ago
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Jan 2, 2021Updated 5 years ago
- A tool for performing an initial information-gathering scan of websites for penetration tests.☆24Aug 27, 2019Updated 6 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Feb 4, 2021Updated 5 years ago
- This repository contains some details about abusing outlook.☆27Aug 17, 2018Updated 7 years ago
- An exquisite network traffic analysis framework☆29Feb 25, 2023Updated 3 years ago
- FFXI Gearswap Lua for the impaired☆10Feb 2, 2026Updated 3 weeks ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- ☆97Feb 18, 2025Updated last year
- A Spicy protocol analyzer for WireGuard☆29Aug 11, 2020Updated 5 years ago
- Ansible playbook automation for pfelk☆23Jan 11, 2022Updated 4 years ago
- Nmap NSE script to identify Debian, Ubuntu, FreeBSD version based on default SSH banner response. Intended for Penentration Testing, OSC…☆33Jan 16, 2026Updated last month
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- SNIcat☆128Aug 19, 2021Updated 4 years ago
- Default plugins for Jaeles Scanner☆35Nov 5, 2020Updated 5 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Jul 21, 2022Updated 3 years ago
- This script is designed for detection of vulnerable servers (CVE-2014-0224.) in a wide range of configurations. It attempts to negotiat…☆39Jul 24, 2014Updated 11 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Jul 13, 2021Updated 4 years ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆149Jun 5, 2025Updated 8 months ago
- Wordlists for intelligent directory brute-forcing☆33Sep 28, 2021Updated 4 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆32Sep 16, 2024Updated last year
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆82Jul 30, 2021Updated 4 years ago
- [READ ONLY] Subtree split of the siyuan-packages-monorepo (see https://github.com/Zuoqiu-Yingyi/siyuan-packages-monorepo)☆12Jan 23, 2024Updated 2 years ago
- StreamlitとLangGraphで実装したHuman-in-the-loop広告コピー文生成アプリケーション☆11Feb 15, 2025Updated last year
- ☆10Mar 8, 2024Updated last year
- ☆35Dec 9, 2023Updated 2 years ago
- Empower your enumeration during OSCP☆36Dec 7, 2018Updated 7 years ago