deadbeefmonster / docker-binaryexploitation
Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)
☆25Updated last year
Alternatives and similar repositories for docker-binaryexploitation
Users that are interested in docker-binaryexploitation are comparing it to the libraries listed below
Sorting:
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆54Updated 6 months ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- ☆55Updated last year
- Files to automatically deploy red team Active Directory test lab☆44Updated 3 years ago
- Posts about different topics☆36Updated last year
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- Continuous kerberoast monitor☆45Updated last year
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Ingest openldap data into bloodhound☆80Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- ☆19Updated 3 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆49Updated 4 years ago
- An Ansible role for installing Cobalt Strike.☆78Updated this week
- A tool to tunnel TCP traffic over WinRM☆18Updated 3 years ago
- ☆42Updated 2 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- ☆15Updated 2 years ago
- ☆18Updated last year
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆17Updated 3 months ago
- ☆55Updated last year
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆60Updated 6 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆36Updated last year