Scan DockerHub images that match a keyword to find secrets.
☆60Feb 17, 2021Updated 5 years ago
Alternatives and similar repositories for docker_explorer
Users that are interested in docker_explorer are comparing it to the libraries listed below
Sorting:
- commonspeak2 subdomains wordlist generated daily **DEPRECATED** The author(s) of commonspeak2 maintain an official repo with more lists. …☆40May 21, 2021Updated 4 years ago
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 3 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆33Nov 12, 2025Updated 3 months ago
- ☆12Aug 1, 2022Updated 3 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆23Mar 2, 2022Updated 4 years ago
- a simple animal jam brute force password cracker with concurrency☆42Mar 8, 2022Updated 3 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Mar 18, 2024Updated last year
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆153Aug 28, 2024Updated last year
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- Fast, compact and all-around subdomain enumeration tool written in Rust☆23Feb 14, 2022Updated 4 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆36Jul 22, 2021Updated 4 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Feb 10, 2023Updated 3 years ago
- ☆119Jun 17, 2021Updated 4 years ago
- A dotnet executable to get an Entra token in an authenticated runtime☆16Oct 30, 2024Updated last year
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated last year
- ☆12Dec 21, 2021Updated 4 years ago
- SonicWall VPN-SSL Exploit* using Golang ( * and other targets vulnerable to shellshock ).☆18Feb 11, 2021Updated 5 years ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 7 months ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated last year
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆14Aug 15, 2022Updated 3 years ago
- Electron based screenshot scanner☆68Feb 4, 2023Updated 3 years ago
- Event Data Collector☆39Jan 12, 2026Updated last month
- A tool to parse, deduplicate, and query multiple port scans.☆57Aug 11, 2023Updated 2 years ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆282Sep 11, 2025Updated 5 months ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- ☆15Aug 31, 2023Updated 2 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- Use SQL to instantly query Hashicorp Vault secrets, certs and more. Open source CLI. No DB required.☆14Oct 2, 2023Updated 2 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- experimental wildcard subdomain filtering prototype☆16Aug 5, 2023Updated 2 years ago
- Discover related domains using Whois data from whoxy.com☆15May 30, 2023Updated 2 years ago