eversinc33 / JailWhaleLinks
Docker container escape enumeration tool.
☆11Updated 4 years ago
Alternatives and similar repositories for JailWhale
Users that are interested in JailWhale are comparing it to the libraries listed below
Sorting:
- FireProx written in Go☆21Updated last year
- ☆19Updated 3 years ago
- A steampipe plugin to query projectdiscovery.io tools.☆27Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Fast website scraper and wordlist generator☆81Updated 6 months ago
- .NET wrapper around LogonUserA to test creds☆12Updated 3 years ago
- ☆29Updated 2 years ago
- CVE-2013-4786 Go exploitation tool☆39Updated 2 years ago
- ☆13Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- ☆18Updated last year
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆20Updated 4 months ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 4 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆67Updated last year
- Modified version of PEAS client for offensive operations☆42Updated 2 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Updated 7 months ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Updated 5 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆88Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Putting the C2 in C2loudflare☆18Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated last year
- ☆16Updated 2 years ago
- visually see issues with supported cipher suites☆17Updated last year
- Nemesis agent for Mythic☆27Updated last year
- Discord C2 Profile for Mythic☆33Updated 8 months ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆29Updated 7 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year