πΈ Scans any of your local Docker images for security vulnerabilities. π
β76Nov 2, 2025Updated 5 months ago
Alternatives and similar repositories for jfrog-docker-desktop-extension
Users that are interested in jfrog-docker-desktop-extension are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Multiplatform Telegram Bot in pure PowerShellβ56Dec 1, 2022Updated 3 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender resβ¦β34Apr 9, 2024Updated 2 years ago
- Web-based GUI for TorBoxβ19Jun 13, 2023Updated 2 years ago
- β12Sep 22, 2022Updated 3 years ago
- Central IoC scanner based on Lokiβ20Nov 12, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applicaβ¦β22May 14, 2025Updated 11 months ago
- β79Apr 6, 2022Updated 4 years ago
- Perform OSINT on external targets using Shodanβ23Feb 7, 2024Updated 2 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.β15Apr 13, 2023Updated 3 years ago
- β10Apr 10, 2014Updated 12 years ago
- A wacky exploitation framework written in pure python3.β22Mar 24, 2024Updated 2 years ago
- Base16 for Shellsβ19Jun 30, 2022Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentestingβ24Aug 13, 2024Updated last year
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.β19Jul 1, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β22May 15, 2022Updated 3 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiterβ28Apr 17, 2022Updated 4 years ago
- spring4shell | CVE-2022-22965β23Jun 30, 2022Updated 3 years ago
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication seβ¦β26Jul 18, 2022Updated 3 years ago
- AWS Security Toolβ29Jan 1, 2024Updated 2 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.β33Updated this week
- Small enough to carry on your back (Backpack) ππ»β32Jun 3, 2023Updated 2 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challengesβ32May 18, 2022Updated 3 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discoveryβ¦β19Dec 23, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available β’ AdRun AI, ML, and HPC workloads on powerful cloud GPUsβwithout limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- delosNmap | Nmap Scriptβ39Jan 15, 2023Updated 3 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.β40Oct 29, 2022Updated 3 years ago
- TUI file explorer based on PowerShell and fzfβ10Aug 4, 2025Updated 8 months ago
- A collection of tools for managing and automating vulnerability management.β13Mar 24, 2022Updated 4 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.β11Mar 13, 2024Updated 2 years ago
- AliGuard PHP WAFβ12Feb 16, 2024Updated 2 years ago
- β10Apr 2, 2022Updated 4 years ago
- Subscan is a simple tool for subdomain scanner, it can scan subdomains fast.β39Aug 9, 2023Updated 2 years ago
- IRC botnet, that's mainly used to launch denial-of-service attacks.β31Jan 19, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whicβ¦β43Aug 5, 2022Updated 3 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.β58Dec 17, 2024Updated last year
- Hanoman is an GUI antivirus engine sigature based detection πβ47Oct 3, 2021Updated 4 years ago
- Bash script for CTF automating basic enumerationβ41Mar 1, 2022Updated 4 years ago
- L2E llama2.c on Commodore C-64β18Feb 22, 2025Updated last year
- mift - a mobile image forensic toolkitβ47Nov 14, 2023Updated 2 years ago
- A tool for facilitating livestock contact tracing.β13Oct 10, 2024Updated last year