docker-training / security-workshop
Repository for Security Workshop content
☆20Updated 7 years ago
Alternatives and similar repositories for security-workshop:
Users that are interested in security-workshop are comparing it to the libraries listed below
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 7 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 8 years ago
- A firewall penetration testing tool suite.☆11Updated 7 years ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- js-beautifier extension for Burp Suite☆30Updated 11 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 6 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 6 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 10 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- ☆12Updated 7 years ago
- Lair Framework dockerized.☆37Updated 3 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- Bash integer overflow in braces☆11Updated 9 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- post-exploitation tools☆15Updated 6 years ago
- ☆50Updated 8 years ago