☆40Aug 25, 2018Updated 7 years ago
Alternatives and similar repositories for Dockerfiles
Users that are interested in Dockerfiles are comparing it to the libraries listed below
Sorting:
- Easy installers for Maru OS.☆12May 19, 2019Updated 6 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Sep 17, 2018Updated 7 years ago
- Viewer for Observing Multiple Computers using VNC☆19Feb 13, 2010Updated 16 years ago
- Deletes old email from my Gmail accounts☆15Oct 13, 2017Updated 8 years ago
- Proof of concept tool used for phishing multi-factor authentication on O365☆14Aug 8, 2018Updated 7 years ago
- I reworked the Go Windows Backdoor to use AES encryption.☆18Jul 19, 2017Updated 8 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- Automated provisioning of Santoku Linux (configuration of an Ubuntu VM containing the Android development environment, including Android …☆11Mar 4, 2014Updated 12 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 3 months ago
- Social Engineering Abusing Google App Scripts☆24Jan 13, 2026Updated 2 months ago
- IP Address Listing Tool☆12Sep 1, 2013Updated 12 years ago
- Run DependencyCheck Against Your Orgs GitHub Repos.☆14Jan 5, 2018Updated 8 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Searches for interesting cached DNS entries.☆56May 15, 2014Updated 11 years ago
- (Unofficial) Python API for http://namechk.com☆20Oct 15, 2015Updated 10 years ago
- Simple Netcat tool written in Go☆23Jun 3, 2023Updated 2 years ago
- A simple tool to dump users in popular forums and CMS :)☆31Jan 30, 2018Updated 8 years ago
- 3.10 kernel for Bacon running CM☆18May 27, 2017Updated 8 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103May 25, 2018Updated 7 years ago
- recon-ng Maltego local transform pack☆39Dec 10, 2013Updated 12 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- Kali Linux, built from initial Debian Jessie, using Vagrant, for deployment to Amazon☆17Dec 10, 2016Updated 9 years ago
- Malware analysis and Reverse Engineering Workshops from Invoke RE☆15Jun 30, 2024Updated last year
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Aug 12, 2014Updated 11 years ago
- The Traditional Swiss Army Knife for OSINT☆557Jun 10, 2021Updated 4 years ago
- ☆38Aug 22, 2018Updated 7 years ago
- Query and report user logons relations from MS Windows Security Events☆243Aug 9, 2018Updated 7 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆31Apr 22, 2018Updated 7 years ago
- ☆28Dec 9, 2018Updated 7 years ago
- A docker wrapper for Tor hidden services.☆43Jun 28, 2016Updated 9 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- dnssinkholelist is a python package focused on combining open source lists of malicious domains, dynamic dns domains, and advertisement d…☆18Apr 13, 2016Updated 9 years ago
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆25Sep 29, 2024Updated last year
- Scans crossdomain.xml policies for expired domain names.☆26Aug 4, 2015Updated 10 years ago
- OpenDNS Graph Miner☆45Apr 28, 2017Updated 8 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Nov 13, 2022Updated 3 years ago