ms-jpq / windows-in-docker-oldView external linksLinks
WHY? So you can run Windows "as a container"
☆51Mar 24, 2022Updated 3 years ago
Alternatives and similar repositories for windows-in-docker-old
Users that are interested in windows-in-docker-old are comparing it to the libraries listed below
Sorting:
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- SubDomain Finder☆13Nov 9, 2021Updated 4 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Dec 8, 2025Updated 2 months ago
- Next generation cyber security research and testing software.☆16Mar 18, 2021Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year
- nodejs ldap server on top of mongodb☆12Aug 15, 2014Updated 11 years ago
- Chromiux is a python based console app that extracts the encrypted saved passwords/cookies in txt format of chrome browser.☆19May 14, 2021Updated 4 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- ☆19Dec 15, 2018Updated 7 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Jul 4, 2020Updated 5 years ago
- Docker image for hacking☆21Feb 10, 2025Updated last year
- Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260☆19Nov 28, 2019Updated 6 years ago
- Cryptanalysis and attack library☆22Apr 12, 2022Updated 3 years ago
- Cross-Site Scripting (XSS) vulnerability analyzer☆21Feb 5, 2026Updated last week
- The DNS Hunt will make your life easier, and of course faster.☆47Nov 15, 2020Updated 5 years ago
- Web application pentesting recon☆23Jul 25, 2020Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Nov 3, 2020Updated 5 years ago
- Duitku Payment gateway for PHPNuxBill☆13Aug 23, 2025Updated 5 months ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Public repo of the SDLauncher Sinden gun configuration assistant☆12May 24, 2021Updated 4 years ago
- A few snippets to show how suricata stats can end up in Influx DB using logstash☆12Jul 11, 2016Updated 9 years ago
- Samsung Galaxy A52s 5G (a52sxq) TWRP Device Tree.☆12Jan 27, 2024Updated 2 years ago
- This is a bash script used for ISPConfig 3 server migrations☆15Sep 13, 2016Updated 9 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- Scapy packet fragment reassembly engines☆35Jan 24, 2021Updated 5 years ago
- ☆15Feb 15, 2022Updated 3 years ago
- A maid cafe's maid AI assistant with Microsoft Semantic Kernel☆10May 11, 2024Updated last year
- Text & sentiment analysis of WhatsApp chat data.☆10Feb 3, 2020Updated 6 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- Converted repository with the history of X-Ray 1.0 game engine development☆10Oct 27, 2024Updated last year
- Fully Undetectable telegram Rat dropper☆35Nov 16, 2020Updated 5 years ago
- Run x509lint from a PostgreSQL function☆11Apr 3, 2020Updated 5 years ago
- SRB2 2.0 git-svn test☆13Mar 12, 2014Updated 11 years ago
- Docker image for squid-deb-proxy☆11Jun 22, 2017Updated 8 years ago
- ☆27Jan 11, 2026Updated last month