phin3has / Dockerfiles
My collection of dockerfiles
☆24Updated 9 years ago
Alternatives and similar repositories for Dockerfiles:
Users that are interested in Dockerfiles are comparing it to the libraries listed below
- Parse nmap's XML output files and insert them into an SQLite database☆29Updated 7 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- IRC bot for cracking hashes☆18Updated 3 years ago
- ☆20Updated 8 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆10Updated 9 years ago
- ☆17Updated 9 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- ☆25Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆22Updated 8 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 7 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- ☆26Updated 4 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- BurpJDSer-ng☆28Updated last month
- Collect hashes password hashes for cracking☆31Updated 11 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆31Updated 12 years ago
- Mixing up CVE and MS like a pro☆24Updated 7 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Mimikatz HashClash☆12Updated 9 years ago