deadbeefmonster / docker-binaryexploitationLinks
Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)
☆25Updated last year
Alternatives and similar repositories for docker-binaryexploitation
Users that are interested in docker-binaryexploitation are comparing it to the libraries listed below
Sorting:
- Tools that trigger False Positive AV alerts☆50Updated 6 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Posts about different topics☆36Updated last year
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- ☆15Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆58Updated 7 months ago
- ☆57Updated last year
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Manticore Adversary Emulation Cli☆48Updated 4 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- ☆27Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Continuous kerberoast monitor☆45Updated last year
- ☆38Updated last year
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- A tool to tunnel TCP traffic over WinRM☆18Updated 3 years ago
- Mythic Developer Series: Workshop Golang Agent☆25Updated last year
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- C# User Simulation☆32Updated 2 years ago
- ☆48Updated 5 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- ☆41Updated 2 years ago
- Qemuno Framework☆24Updated 2 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆30Updated 2 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- blame Huy☆42Updated 4 years ago