eversinc33 / JailWhaleLinks
Docker container escape enumeration tool.
☆11Updated 4 years ago
Alternatives and similar repositories for JailWhale
Users that are interested in JailWhale are comparing it to the libraries listed below
Sorting:
- ☆19Updated 3 years ago
- Fast website scraper and wordlist generator☆82Updated 7 months ago
- A steampipe plugin to query projectdiscovery.io tools.☆27Updated last year
- ☆30Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- .NET wrapper around LogonUserA to test creds☆12Updated 3 years ago
- ☆19Updated last year
- FireProx written in Go☆21Updated last year
- CVE-2013-4786 Go exploitation tool☆39Updated 3 weeks ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆50Updated 2 years ago
- ☆27Updated 2 years ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆16Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- ☆16Updated 2 years ago
- A National Vulnerability Database (NVD) API query tool☆17Updated 2 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- ☆27Updated 2 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated last year
- Modified version of PEAS client for offensive operations☆43Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Exploits Unauth Docker API☆42Updated 7 months ago
- ☆14Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Updated last year
- self-hosted Azure OSINT tool☆31Updated 5 months ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆45Updated 11 months ago
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago