eversinc33 / JailWhaleLinks
Docker container escape enumeration tool.
☆11Updated 4 years ago
Alternatives and similar repositories for JailWhale
Users that are interested in JailWhale are comparing it to the libraries listed below
Sorting:
- FireProx written in Go☆21Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- A steampipe plugin to query projectdiscovery.io tools.☆27Updated last year
- ☆18Updated 3 years ago
- .NET wrapper around LogonUserA to test creds☆12Updated 3 years ago
- ☆29Updated 2 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- Fast website scraper and wordlist generator☆81Updated 3 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 11 months ago
- CVE-2013-4786 Go exploitation tool☆39Updated last year
- ☆18Updated last year
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆42Updated 7 months ago
- ☆13Updated last year
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 4 years ago
- ☆15Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆66Updated 10 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- An Evil OIDC Server☆53Updated 2 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆33Updated this week
- ☆27Updated 2 years ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆15Updated last year
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Nemesis agent for Mythic☆27Updated 11 months ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- A National Vulnerability Database (NVD) API query tool☆18Updated 2 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Updated 4 years ago
- ☆28Updated last year
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆19Updated last week
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year