Docker container escape enumeration tool.
☆12Jan 23, 2021Updated 5 years ago
Alternatives and similar repositories for JailWhale
Users that are interested in JailWhale are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 6 months ago
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 4 years ago
- Code-snippets for developing eBPF programs☆20Oct 6, 2025Updated 5 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Exploiting Jackson deserialization vulnerability with 3 gadgets☆10May 3, 2021Updated 4 years ago
- Makes browser beep.☆24Apr 29, 2017Updated 8 years ago
- ☆12Jun 20, 2023Updated 2 years ago
- Exploit for CVE-2018-7600.. called drupalgeddon2,☆11Apr 19, 2018Updated 7 years ago
- 📦 Quick boilerplate to get you started with TailwindCSS☆18Apr 7, 2023Updated 2 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 8 years ago
- ☆16May 15, 2020Updated 5 years ago
- This repository contains code implementation of the paper "AI-Guardian: Defeating Adversarial Attacks using Backdoors, at IEEE Security a…☆14Aug 13, 2023Updated 2 years ago
- Reimplementation of the KExecDD DSE bypass technique.☆60Sep 7, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆15Nov 15, 2023Updated 2 years ago
- A useful working time calculator☆20Jun 28, 2022Updated 3 years ago
- Practical Jupyter notebooks from Andrew Ng and Giskard team's "Red Teaming LLM Applications" course on DeepLearning.AI.☆23Apr 8, 2024Updated last year
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Aug 8, 2020Updated 5 years ago
- NIVA is a simple web application which is intentionally vulnerable to NoSQL injection. The purpose of this project is to facilitate a bet…☆19Nov 21, 2022Updated 3 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Mar 5, 2023Updated 3 years ago
- ☆20May 22, 2023Updated 2 years ago
- Tools and scripts written for personal use☆12Jan 3, 2021Updated 5 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆33Nov 12, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- LaravelN00b .env Scanner☆36Jan 14, 2020Updated 6 years ago
- PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10…☆35Sep 24, 2022Updated 3 years ago
- ☆12Mar 18, 2025Updated last year
- The dotfiles for my GNU/Linux setup.☆17Sep 19, 2021Updated 4 years ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆136Aug 23, 2025Updated 7 months ago
- ☆39Sep 26, 2022Updated 3 years ago
- Create a GitHub profile README nested inside a terminal nested inside a GIF☆18Mar 7, 2023Updated 3 years ago
- POC for utilizing wikipedia API for Command and Control☆28Dec 8, 2022Updated 3 years ago
- An SSH honeypot written entirely in Go.☆13Dec 4, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46May 31, 2023Updated 2 years ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Oct 14, 2024Updated last year
- Literally spray blind xss payloads everywhere.☆26Feb 22, 2022Updated 4 years ago
- Simple python client to upload files to the transfer.sh service☆10Dec 19, 2016Updated 9 years ago
- ☆24Nov 11, 2022Updated 3 years ago
- Nmap Web Dashboard and Reporting☆34May 1, 2022Updated 3 years ago
- ATT&CK Models of the Threat Actor "Phineas Fisher"☆13Apr 30, 2020Updated 5 years ago