flast101 / docker-privescLinks
Privilege escalation in Docker
☆31Updated 3 years ago
Alternatives and similar repositories for docker-privesc
Users that are interested in docker-privesc are comparing it to the libraries listed below
Sorting:
- ☆60Updated 2 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- ☆13Updated 2 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆32Updated 2 months ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆66Updated 4 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- Get GTFOBins info about a given exploit from the command line☆39Updated last year
- ☆38Updated 4 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆45Updated 5 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 4 years ago
- Scan DockerHub images that match a keyword to find secrets.☆61Updated 4 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 4 years ago
- Jumpstart multiple WebSocket servers quickly☆31Updated 4 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆28Updated last month
- Fast and intuitive manager for multiple reverse shells☆86Updated last year
- Find the remote website version based on a git repository☆126Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- ☆25Updated 7 months ago
- Target practice for ffuf☆69Updated 4 years ago
- Backend for Nuclear Pond☆22Updated 2 years ago
- Open a DNS server that knows no records but records every request. Used for DNS exfiltration.☆69Updated 4 years ago
- ☆30Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- Most common AWS S3 bucket names.☆28Updated 5 years ago
- ☆19Updated 4 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- Pull secrets from an AWS environment☆67Updated 6 years ago
- Penetration Testing with Kali Linux☆22Updated 6 years ago
- ☆37Updated 6 years ago