qtc-de / container-arsenalLinks
Collection of docker containers for security assessments and CTFs. Commandline tool for starting, stopping and managing them.
☆24Updated 3 years ago
Alternatives and similar repositories for container-arsenal
Users that are interested in container-arsenal are comparing it to the libraries listed below
Sorting:
- Exploits made practicing for OSCE☆23Updated 5 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆43Updated 5 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- Caesar-Cipher based encryption☆31Updated 4 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 6 years ago
- Simple python script for AD enumeration☆31Updated 4 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26Updated 3 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Updated 5 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆52Updated 5 years ago
- A tool to tunnel TCP traffic over WinRM☆18Updated 4 years ago
- ☆20Updated 5 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Updated 4 years ago
- SSH spreading made easy for red teams in a hurry☆57Updated 2 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Updated 2 years ago
- Cisco Unfied Call Manager enumeration☆25Updated 3 years ago
- Sustainable shellcode evasion☆112Updated last year
- ☆12Updated last year
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Updated 4 years ago
- A tool to password spray Jenkins instances☆59Updated 6 years ago
- Modified version of PEAS client for offensive operations☆43Updated 2 years ago
- Anonymize your hashcat formatted files for online cracking☆31Updated last year
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 6 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- async parser for JET☆25Updated last month
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- A logging ASKPASS binary☆29Updated 5 years ago