jivoi / dockerfiles
cool dockerfiles
☆12Updated 8 years ago
Alternatives and similar repositories for dockerfiles:
Users that are interested in dockerfiles are comparing it to the libraries listed below
- how-to monitor Docker hosts☆10Updated 8 years ago
- home! sweet home☆23Updated 5 years ago
- buffer overflow examples☆21Updated 7 years ago
- openvpn server configs☆13Updated 8 years ago
- site source jivoi.github.io☆22Updated 2 years ago
- Various exploits☆10Updated 7 years ago
- intrusion detection☆23Updated 7 years ago
- only for 31337☆22Updated 8 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆13Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- A port scanner written in PowerShell☆13Updated 3 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Search bing with python☆12Updated 10 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Guidelines for writing secure code for Python developers.☆19Updated 7 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- Python support package to parse IP and host inputs from network based tooling☆11Updated last year
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆14Updated 2 years ago
- Training scenarios for cyber ranges☆11Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Yet another powerful payload encoder/decoder☆14Updated 2 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- A collection of personal ZAP scripts☆13Updated last year
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago