pyperanger / dockerevil
WorldFirst (Public) Docker API Exploit - My security researches involving Docker and Openshift
☆33Updated 3 years ago
Alternatives and similar repositories for dockerevil:
Users that are interested in dockerevil are comparing it to the libraries listed below
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Enyx SNMP IPv6 Enumeration Tool☆102Updated 2 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- Scripts to execute enumeration via LFI☆90Updated 6 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆142Updated 3 years ago
- DEFCON 27 slides and workshop materials.☆127Updated 4 years ago
- Tool that automates Active Directory enumeration☆88Updated 3 years ago
- A list of "secrets" from JWT sample code and readme files.☆55Updated 4 years ago
- A HTA shell to assist with breakout assessments.☆113Updated 3 years ago
- Domain user enumeration tool☆215Updated last year
- Some random exploits that may or may not be useful. Not responsible for misuse.☆21Updated 6 years ago
- Changes for Visual Studio 2013☆117Updated 9 years ago
- Collection of things made during my preparation to take on OSEE☆97Updated 5 years ago
- Handbook and survival guide for hacking over the wire, OSCP-style☆43Updated 4 years ago
- …(⊙_⊙;)…☆56Updated 4 years ago
- 👹☆56Updated 3 years ago
- ☆16Updated 6 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆202Updated last year
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- Custom tools and projects about security☆110Updated 4 years ago
- Windows Kernel Exploits☆66Updated 7 years ago
- Responsive Command and Control System☆104Updated 2 years ago
- Windows Enumeration and Privilege Escalation Script☆18Updated 5 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 4 years ago
- ☆143Updated 5 years ago
- Weaponizing Splunk with reverse and bind shells.☆181Updated 8 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- A Linux enumeration script for Hack The Box☆188Updated 5 years ago