dockscan is security vulnerability and audit scanner for Docker installations
☆219Aug 27, 2016Updated 9 years ago
Alternatives and similar repositories for dockscan
Users that are interested in dockscan are comparing it to the libraries listed below
Sorting:
- drydock provides a flexible way of assessing the security of your Docker daemon configuration and containers using editable audit templat…☆65May 13, 2016Updated 9 years ago
- Hardening and Auditing Tool For Docker Hosts & Containers☆69Jul 4, 2015Updated 10 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- Docker Automated Build for Security Testing Tools☆14Apr 8, 2022Updated 3 years ago
- a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containe…☆1,219May 23, 2023Updated 2 years ago
- The Most Comprehensive Docker Security Scanner☆1,524Updated this week
- A framework for Static Analysis of Docker container images☆288Aug 26, 2019Updated 6 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Repository holding all alternatives of *nix backdoors.☆153Jun 19, 2015Updated 10 years ago
- A Github organization reconnaissance tool.☆219May 22, 2023Updated 2 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆277Feb 12, 2021Updated 5 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.☆243Sep 13, 2021Updated 4 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Kubernetes Auto Analyzer☆191Dec 11, 2019Updated 6 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Nov 27, 2016Updated 9 years ago
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 6 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- detectem - detect software and its version on websites.☆157Mar 25, 2021Updated 4 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Dec 24, 2018Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.☆739Mar 18, 2024Updated last year
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- SSLMap - TLS/SSL cipher suite scanner.☆64Jun 11, 2019Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Dec 21, 2015Updated 10 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆312Oct 22, 2016Updated 9 years ago
- Specify targets and run sets of tools against them☆386Apr 23, 2019Updated 6 years ago