pyperanger / dockerevilLinks
WorldFirst (Public) Docker API Exploit - My security researches involving Docker and Openshift
☆33Updated 3 years ago
Alternatives and similar repositories for dockerevil
Users that are interested in dockerevil are comparing it to the libraries listed below
Sorting:
- Enyx SNMP IPv6 Enumeration Tool☆103Updated 2 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Weaponizing Splunk with reverse and bind shells.☆183Updated 8 years ago
- DEFCON 27 slides and workshop materials.☆128Updated 5 years ago
- Some random exploits that may or may not be useful. Not responsible for misuse.☆21Updated 6 years ago
- Custom tools and projects about security☆110Updated this week
- Domain user enumeration tool☆215Updated last year
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆204Updated 2 years ago
- Obfuscated Penetration Testing PowerShell scripts☆147Updated 8 months ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- Windows Enumeration and Privilege Escalation Script☆18Updated 5 years ago
- ☆154Updated 7 years ago
- Changes for Visual Studio 2013☆118Updated 10 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆264Updated 7 years ago
- Collection of things made during my preparation to take on OSEE☆98Updated 5 years ago
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆232Updated 4 years ago
- A Linux enumeration script for Hack The Box☆190Updated 5 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆254Updated 2 years ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆194Updated last year
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- Simple script to generate commands to achieve reverse shells.☆119Updated 4 years ago
- 👹☆56Updated 3 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- Handbook and survival guide for hacking over the wire, OSCP-style☆43Updated 4 years ago
- Password decryption tool for the McAfee SiteList.xml file☆142Updated last year
- This is a weaponized WSUS exploit☆285Updated 2 years ago
- Linux Local Enumeration Script☆79Updated 5 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆144Updated 3 years ago
- Scripts to execute enumeration via LFI☆90Updated 6 years ago
- A collection of my Dockerfiles☆90Updated 2 years ago