My collection of dockerfiles
☆24Feb 15, 2016Updated 10 years ago
Alternatives and similar repositories for Dockerfiles
Users that are interested in Dockerfiles are comparing it to the libraries listed below
Sorting:
- CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)☆12Apr 18, 2018Updated 7 years ago
- ☆29Mar 31, 2017Updated 8 years ago
- A brute force program to test weak accounts configured to access a JMX Registry☆35Feb 1, 2017Updated 9 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 10 months ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Builder for an ARM compatible Docker image of https://github.com/crosbymichael/dockerui☆17Jun 16, 2016Updated 9 years ago
- A pwning environment, now on docker!☆18Jul 3, 2021Updated 4 years ago
- A Pastebin scraper designed to look for malicious content☆20Nov 20, 2019Updated 6 years ago
- Meteor package for client + server side IMSI-catcher detection.☆21Jun 9, 2016Updated 9 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆26Apr 14, 2015Updated 10 years ago
- Useful OSINT tools for Discord☆23Jan 21, 2026Updated last month
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Jun 19, 2018Updated 7 years ago
- ☆90Sep 18, 2017Updated 8 years ago
- Improved decoder for Burp Suite☆138Aug 30, 2021Updated 4 years ago
- DO NOT USE: this is a vulnerable ASP.NET web app using Razor templating engine. The vulnerability is a Server-Side Template Injection (SS…☆28Aug 22, 2020Updated 5 years ago
- Repository for LNK stuff☆31Aug 31, 2022Updated 3 years ago
- ☆22May 20, 2016Updated 9 years ago
- ☆22Mar 2, 2016Updated 10 years ago
- Manage Engine Decrypter☆24Oct 17, 2022Updated 3 years ago
- XXE Injection Payloads☆28Jul 30, 2019Updated 6 years ago
- ☆137Mar 29, 2018Updated 7 years ago
- ☆24Feb 12, 2016Updated 10 years ago
- Clickjacking Proof-of-Concept Exploit☆25Oct 1, 2020Updated 5 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- ☆36Oct 27, 2019Updated 6 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- ☆66Aug 25, 2021Updated 4 years ago
- WIreless Hacking Tools☆167Aug 5, 2013Updated 12 years ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- ☆27Oct 28, 2019Updated 6 years ago
- ☆127Jun 19, 2020Updated 5 years ago
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆81Apr 2, 2025Updated 11 months ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆27Apr 6, 2020Updated 5 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- Predict whether internet traffic is malicious given historical router traffic data☆35Aug 13, 2020Updated 5 years ago