flast101 / docker-privesc
Privilege escalation in Docker
☆30Updated 2 years ago
Alternatives and similar repositories for docker-privesc:
Users that are interested in docker-privesc are comparing it to the libraries listed below
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆40Updated 4 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- Enumerate AWS permissions and resources.☆66Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆62Updated 4 months ago
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago
- ☆14Updated 4 years ago
- Command line client for HackTheBox☆21Updated 10 months ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 2 years ago
- ☆31Updated 5 years ago
- ☆58Updated last year
- Files for my Python3 Create Your Own Tool Series☆23Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆110Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆19Updated 3 years ago
- ☆14Updated 3 years ago
- Principles and commands for penetration testing and OSCP☆9Updated 4 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 6 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- Autowin is a framework that helps organizations simulate custom attack scenarios in order to improve detection and response capabilities.☆19Updated 3 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated last year
- Backend for Nuclear Pond☆21Updated last year
- ☆10Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆67Updated 3 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆39Updated 4 months ago
- Oh-my-zsh theme for pentesters which includes the date, time, and IP address for pentest logging.☆43Updated 11 months ago