My collection of dockerfiles
☆24Feb 15, 2016Updated 10 years ago
Alternatives and similar repositories for Dockerfiles
Users that are interested in Dockerfiles are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)☆12Apr 18, 2018Updated 7 years ago
- Uncover IPv6 address harvesting through firewall log analysis☆13Jan 29, 2016Updated 10 years ago
- A brute force program to test weak accounts configured to access a JMX Registry☆35Feb 1, 2017Updated 9 years ago
- A rogue DNS detector☆24Nov 20, 2025Updated 4 months ago
- Clickjacking Proof-of-Concept Exploit☆25Oct 1, 2020Updated 5 years ago
- Builder for an ARM compatible Docker image of https://github.com/crosbymichael/dockerui☆17Jun 16, 2016Updated 9 years ago
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆26Apr 14, 2015Updated 10 years ago
- A gpgAuth client implementation for chrome on Windows, Linux and OSX☆18Jan 20, 2013Updated 13 years ago
- GDAX Pocket UI☆10Feb 18, 2020Updated 6 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- ☆23May 20, 2016Updated 9 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- Independent file type identification python library☆12Mar 16, 2023Updated 3 years ago
- ☆24Feb 12, 2016Updated 10 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- ☆90Sep 18, 2017Updated 8 years ago
- QEMU emulation of the STM32F2XX☆18Apr 16, 2013Updated 12 years ago
- Useful OSINT tools for Discord☆23Jan 21, 2026Updated 2 months ago
- iPython notebooks presented in rogue.ly/spy☆23Jul 26, 2014Updated 11 years ago
- ☆127Jun 19, 2020Updated 5 years ago
- A tool to analyse JMX API security level.☆44Jul 23, 2014Updated 11 years ago
- An http2 stack living on top of scapy☆11Oct 24, 2018Updated 7 years ago
- This is a template for a Node-RED project meant to be run in local mode☆17May 29, 2019Updated 6 years ago
- Yet Another Nand Dumper☆23Sep 7, 2023Updated 2 years ago
- ☆11Nov 3, 2016Updated 9 years ago
- WIreless Hacking Tools☆167Aug 5, 2013Updated 12 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 6 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- ☆36Oct 27, 2019Updated 6 years ago
- Retrive the status codes from a list of URLs☆33May 18, 2020Updated 5 years ago
- A Pastebin scraper designed to look for malicious content☆20Nov 20, 2019Updated 6 years ago
- A smart file fuzzer.☆26Aug 19, 2016Updated 9 years ago
- Example of running Datasette on Azure Functions☆11Mar 27, 2021Updated 4 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago