Dockerized Transmission, the most popular opensource Torrent Client
☆12Nov 1, 2017Updated 8 years ago
Alternatives and similar repositories for docker-transmission
Users that are interested in docker-transmission are comparing it to the libraries listed below
Sorting:
- Blacklist ip addresses caught scanning or bruteforcing hosts☆20Jan 6, 2019Updated 7 years ago
- NTPD remote DOS exploit and vulnerable container☆25Oct 30, 2017Updated 8 years ago
- A curated list of free public proxy servers☆72Jan 6, 2019Updated 7 years ago
- Docker image to test HTTP load balancers☆35Dec 22, 2019Updated 6 years ago
- Arduino development environment in a container☆17Nov 1, 2017Updated 8 years ago
- OpenSSH remote DOS exploit and vulnerable container☆53Oct 30, 2017Updated 8 years ago
- Black Nurse DOS attack☆70Oct 30, 2017Updated 8 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- Easily setup a hidden service inside the Tor network☆173Nov 2, 2023Updated 2 years ago
- XMrig miner in a container !☆14Dec 19, 2021Updated 4 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- A collection of hex utilities in python☆14Mar 1, 2013Updated 13 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- CHIP-8 Emulator☆24Sep 7, 2017Updated 8 years ago
- node.js module to detect when the system wakes up from sleep mode and calls a callback function.☆10May 8, 2019Updated 6 years ago
- Simple docker lita bot container☆10Jun 25, 2015Updated 10 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- INACTIVE - http://mzl.la/ghe-archive - Vagrantfile and Dockerfiles that help make minion development and deployment far easier☆13Mar 29, 2019Updated 6 years ago
- ActiveMQ Deserialization RCE☆15Aug 30, 2019Updated 6 years ago
- Repo for this AWS Blogpost☆14Jan 30, 2026Updated last month
- Small helper program for monitor layouts.☆10Nov 9, 2016Updated 9 years ago
- Apply a base system configuration, quickly!☆17Dec 7, 2025Updated 2 months ago
- Basic role to setup Debian as a server☆11Aug 25, 2022Updated 3 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- Ruby library for pure SSL/TLS handshake testing. No additional requirements.☆11Nov 8, 2021Updated 4 years ago
- gnu radio files☆12Oct 6, 2015Updated 10 years ago
- ☆10Jun 27, 2017Updated 8 years ago
- ☆14Sep 15, 2016Updated 9 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- Project examples☆12Feb 15, 2016Updated 10 years ago
- My prototype of a USB-connected joystick that uses HID protocol, written in C using Atmega microcontrollers.☆10Nov 5, 2022Updated 3 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago