phin3has / docker-pentest-listsLinks
Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests
☆21Updated 8 years ago
Alternatives and similar repositories for docker-pentest-lists
Users that are interested in docker-pentest-lists are comparing it to the libraries listed below
Sorting:
- ☆25Updated 4 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆14Updated 7 years ago
- ☆36Updated 5 years ago
- Code snippets I find useful☆31Updated 7 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 6 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Burp Commander written in Go☆58Updated 6 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- A number of scripts POC's and problems solved as pentests move along.☆45Updated last year
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- Docker Version of Aquatone☆14Updated 7 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 6 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago
- ☆20Updated 5 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- Docker auditing and enumeration script.☆22Updated 5 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- AV Bypass☆29Updated 7 years ago