My collection of dockerfiles
☆24Feb 15, 2016Updated 10 years ago
Alternatives and similar repositories for Dockerfiles
Users that are interested in Dockerfiles are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)☆12Apr 18, 2018Updated 7 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆53Jul 15, 2018Updated 7 years ago
- A brute force program to test weak accounts configured to access a JMX Registry☆35Feb 1, 2017Updated 9 years ago
- A rogue DNS detector☆24Nov 20, 2025Updated 4 months ago
- Clickjacking Proof-of-Concept Exploit☆26Oct 1, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Builder for an ARM compatible Docker image of https://github.com/crosbymichael/dockerui☆17Jun 16, 2016Updated 9 years ago
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆26Apr 14, 2015Updated 10 years ago
- ☆16Mar 20, 2026Updated 3 weeks ago
- GDAX Pocket UI☆10Feb 18, 2020Updated 6 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- ☆23May 20, 2016Updated 9 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- A pwning environment, now on docker!☆18Jul 3, 2021Updated 4 years ago
- ☆24Feb 12, 2016Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- ☆90Sep 18, 2017Updated 8 years ago
- Improved decoder for Burp Suite☆138Aug 30, 2021Updated 4 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Jun 19, 2018Updated 7 years ago
- iPython notebooks presented in rogue.ly/spy☆23Jul 26, 2014Updated 11 years ago
- ☆27Oct 28, 2019Updated 6 years ago
- ☆22Mar 2, 2016Updated 10 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- ☆128Jun 19, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A tool to analyse JMX API security level.☆44Jul 23, 2014Updated 11 years ago
- Material related to my talks at various conferences on using Continuous Integration tools (Jenkins, Teamcity, Go, Hudson, CruiseControl) …☆123Dec 11, 2016Updated 9 years ago
- This is a template for a Node-RED project meant to be run in local mode☆17May 29, 2019Updated 6 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- WIreless Hacking Tools☆167Aug 5, 2013Updated 12 years ago
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 6 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Retrive the status codes from a list of URLs☆33May 18, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆85Apr 2, 2025Updated last year
- Example of running Datasette on Azure Functions☆11Mar 27, 2021Updated 5 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 4 years ago
- A framework for PowerShell and PoshSec scripts for network management, security, and maintenance.☆144Dec 8, 2022Updated 3 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago