eversinc33 / JailWhaleLinks
Docker container escape enumeration tool.
☆11Updated 4 years ago
Alternatives and similar repositories for JailWhale
Users that are interested in JailWhale are comparing it to the libraries listed below
Sorting:
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆13Updated 11 months ago
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 11 months ago
- CVE-2013-4786 Go exploitation tool☆39Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- ☆29Updated 2 years ago
- ☆18Updated 3 years ago
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆33Updated last month
- Webshell agent in aspx and php☆22Updated last month
- .NET wrapper around LogonUserA to test creds☆12Updated 3 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆65Updated 9 months ago
- FireProx written in Go☆20Updated last year
- ☆18Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- ☆15Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated 2 years ago
- Discord C2 Profile for Mythic☆30Updated 4 months ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆42Updated 6 months ago
- ☆28Updated last year
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Updated 4 years ago
- Manage attack surface data on Elasticsearch☆22Updated last year
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated 10 months ago
- S3 bucket enumerator☆30Updated 6 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- ☆27Updated 2 years ago
- ☆17Updated 6 months ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 4 years ago