phin3has / docker-pentest-listsLinks
Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests
☆21Updated 8 years ago
Alternatives and similar repositories for docker-pentest-lists
Users that are interested in docker-pentest-lists are comparing it to the libraries listed below
Sorting:
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- API testing tool written with Python☆56Updated 8 years ago
- ☆25Updated 4 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 7 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- ☆21Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Updated 7 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- Docker auditing and enumeration script.☆22Updated 5 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- A number of scripts POC's and problems solved as pentests move along.☆44Updated last year
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 6 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Updated 7 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 5 years ago
- A collection of scripts used to interact with the Burp Rest API☆52Updated 6 years ago
- AV Bypass☆29Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Search the ExploitDB with a little more control☆21Updated 8 years ago