phin3has / docker-pentest-lists
Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests
☆21Updated 7 years ago
Alternatives and similar repositories for docker-pentest-lists:
Users that are interested in docker-pentest-lists are comparing it to the libraries listed below
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 7 years ago
- ☆25Updated 3 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- Miscellaneous for various things☆20Updated 4 months ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Personal blog about security, exploitation, CTFs, ...☆20Updated 6 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 5 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- HoneyDB Python Module☆13Updated last year
- Docker Version of Aquatone☆13Updated 6 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- Code snippets I find useful☆31Updated 7 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆18Updated 5 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- AV Bypass☆29Updated 7 years ago
- ☆20Updated 5 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 6 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 6 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- ☆30Updated 6 years ago