firefart / dockerctf
my goto docker image when playing ctfs with all the tools I need
☆15Updated 3 weeks ago
Alternatives and similar repositories for dockerctf:
Users that are interested in dockerctf are comparing it to the libraries listed below
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- Anonymize your hashcat formatted files for online cracking☆28Updated 3 months ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆40Updated 4 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆58Updated 6 years ago
- My Python Cookiecutter project template☆30Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Check robustness of your (their) Active Directory accounts passwords☆34Updated 11 months ago
- Ansible scripts to build an attack box☆22Updated 6 years ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- An Evil OIDC Server☆53Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆110Updated last year
- self-hosted Azure OSINT tool☆26Updated 5 months ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆25Updated 5 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- Merge multiple nMap xml files into one☆50Updated 5 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆59Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 3 months ago
- Enumerate AWS permissions and resources.☆67Updated 2 years ago
- masscan with exclusive excludes☆55Updated last year
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆20Updated 2 months ago
- Fast website scraper and wordlist generator☆75Updated last year
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- Rosie the Pivoter☆17Updated 6 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- Exfiltration based on custom X509 certificates☆26Updated 11 months ago