eversinc33 / JailWhaleLinks
Docker container escape enumeration tool.
☆11Updated 4 years ago
Alternatives and similar repositories for JailWhale
Users that are interested in JailWhale are comparing it to the libraries listed below
Sorting:
- FireProx written in Go☆21Updated last year
- A steampipe plugin to query projectdiscovery.io tools.☆27Updated last year
- CVE-2013-4786 Go exploitation tool☆39Updated last month
- ☆19Updated 3 years ago
- .NET wrapper around LogonUserA to test creds☆12Updated 3 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- ☆16Updated 2 years ago
- ☆30Updated 2 years ago
- ☆14Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Updated last year
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Updated 5 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated last week
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Updated 7 months ago
- Exploits Unauth Docker API☆43Updated 8 months ago
- Modified version of PEAS client for offensive operations☆42Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Updated last year
- ☆53Updated 2 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆21Updated 5 months ago
- Fast website scraper and wordlist generator☆82Updated 8 months ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated 2 years ago
- ☆19Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- ☆27Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆67Updated last year
- Extract credentials from lsass remotely☆16Updated 6 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 4 years ago
- A National Vulnerability Database (NVD) API query tool☆17Updated 2 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆49Updated last month