pyperanger / dockerevil
WorldFirst (Public) Docker API Exploit - My security researches involving Docker and Openshift
☆33Updated 3 years ago
Alternatives and similar repositories for dockerevil:
Users that are interested in dockerevil are comparing it to the libraries listed below
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Enyx SNMP IPv6 Enumeration Tool☆102Updated 2 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 4 years ago
- Changes for Visual Studio 2013☆116Updated 9 years ago
- Weaponizing Splunk with reverse and bind shells.☆176Updated 7 years ago
- A HTA shell to assist with breakout assessments.☆112Updated 3 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆106Updated 5 years ago
- Simple script to generate commands to achieve reverse shells.☆116Updated 4 years ago
- Samba, NFS shares spider and grepper☆71Updated 6 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆140Updated 3 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆36Updated 3 months ago
- A tool to create obfuscated HTA script.☆176Updated 3 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- Domain user enumeration tool☆215Updated last year
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆44Updated 9 years ago
- Reconnaissance tool for Microsoft Office 365☆67Updated 6 years ago
- ☆9Updated 3 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆201Updated last year
- ☆141Updated 5 years ago
- 👹☆56Updated 3 years ago
- DEFCON 27 slides and workshop materials.☆128Updated 4 years ago
- ☆16Updated 6 years ago
- Tool that automates Active Directory enumeration☆89Updated 3 years ago
- BloodHound Docker Ready to Use☆87Updated last year
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆64Updated 6 years ago
- Obfuscated Penetration Testing PowerShell scripts☆141Updated 3 months ago
- Collection of things made during my preparation to take on OSEE☆95Updated 5 years ago
- A list of "secrets" from JWT sample code and readme files.☆54Updated 4 years ago