qtc-de / container-arsenalLinks
Collection of docker containers for security assessments and CTFs. Commandline tool for starting, stopping and managing them.
☆25Updated 3 years ago
Alternatives and similar repositories for container-arsenal
Users that are interested in container-arsenal are comparing it to the libraries listed below
Sorting:
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- SSH spreading made easy for red teams in a hurry☆57Updated last year
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆87Updated 4 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 4 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- A tool to tunnel TCP traffic over WinRM☆18Updated 4 years ago
- ☆38Updated 6 months ago
- Simple python script for AD enumeration☆31Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆43Updated 5 years ago
- Vulnerabilities, exploits, and PoCs☆37Updated 2 months ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 5 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆33Updated 3 years ago
- Caesar-Cipher based encryption☆30Updated 4 years ago
- Import Nmap scans to Cherrytree☆37Updated 3 years ago
- ☆20Updated 5 years ago
- Posts about different topics☆36Updated last year
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- A tool to password spray Jenkins instances☆57Updated 6 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- A mirror of several precompiled standalone red-teaming tools.☆18Updated 2 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆105Updated 6 years ago
- ☆21Updated 2 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆26Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago