eversinc33 / JailWhaleView external linksLinks
Docker container escape enumeration tool.
☆12Jan 23, 2021Updated 5 years ago
Alternatives and similar repositories for JailWhale
Users that are interested in JailWhale are comparing it to the libraries listed below
Sorting:
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 5 months ago
- Python3 tool to perform password spraying using RDP☆16Aug 14, 2023Updated 2 years ago
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 4 years ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Mar 5, 2023Updated 2 years ago
- ☆24Nov 11, 2022Updated 3 years ago
- Reimplementation of the KExecDD DSE bypass technique.☆58Sep 7, 2024Updated last year
- POC for utilizing wikipedia API for Command and Control☆29Dec 8, 2022Updated 3 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Nov 12, 2022Updated 3 years ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆131Aug 23, 2025Updated 5 months ago
- PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10…☆35Sep 24, 2022Updated 3 years ago
- Nmap Web Dashboard and Reporting☆34May 1, 2022Updated 3 years ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- Password spraying tool for Microsoft Online accounts (Entra/Azure/O365)☆67Mar 20, 2024Updated last year
- Evildork targeting your fiancee👁️☆92Jul 30, 2023Updated 2 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46May 31, 2023Updated 2 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 2 months ago
- Flight computer software for UCLA's rocket team.☆13Mar 18, 2017Updated 8 years ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Exploit for CVE-2018-7600.. called drupalgeddon2,☆11Apr 19, 2018Updated 7 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google sear…☆19Aug 10, 2025Updated 6 months ago
- ☆39Sep 26, 2022Updated 3 years ago
- Want to crack passwords faster by using a wordlist that fits your 'target audience'? Use WikiRaider.☆45Feb 2, 2024Updated 2 years ago
- CveXplore☆42Sep 12, 2025Updated 5 months ago
- Golang C2 Server and Agents using XMT (https://github.com/iDigitalFlame/xmt)☆41Dec 17, 2025Updated last month
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Jul 19, 2020Updated 5 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- Prompts for ChatGPT 4 useful for developers, cybersecurity professionals, hackers and IT workers☆13Mar 20, 2023Updated 2 years ago
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- A python library to automate time-based blind SQL injection☆49Sep 15, 2019Updated 6 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago