phin3has / docker-pentest-lists
Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests
☆21Updated 8 years ago
Alternatives and similar repositories for docker-pentest-lists:
Users that are interested in docker-pentest-lists are comparing it to the libraries listed below
- Useful Windows and AD tools☆15Updated 3 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- ☆25Updated 3 years ago
- Docker Version of Aquatone☆14Updated 6 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 6 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 7 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- introduction to distributed scanning using vultr☆11Updated 8 years ago
- HoneyDB Python Module☆13Updated last year
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 6 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆29Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- ☆20Updated 5 years ago
- ☆35Updated 5 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 6 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Updated 5 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago