Collection of docker containers for security assessments and CTFs. Commandline tool for starting, stopping and managing them.
☆23Apr 29, 2022Updated 3 years ago
Alternatives and similar repositories for container-arsenal
Users that are interested in container-arsenal are comparing it to the libraries listed below
Sorting:
- ccm - A small python library that helps identify vulnerabilities inside of encrypted data☆11Aug 17, 2020Updated 5 years ago
- Adding encoding capabilities to the vim editor☆11Oct 24, 2025Updated 4 months ago
- ☆13Jul 30, 2021Updated 4 years ago
- Entra ID Password Protection Banned Password Lists☆17Apr 16, 2024Updated last year
- ☆15Aug 22, 2022Updated 3 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- C# version of MDSec's ParallelSyscalls☆142Jan 9, 2022Updated 4 years ago
- Get Fine Grained Password Policy☆77Apr 15, 2025Updated 10 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆21Nov 28, 2025Updated 3 months ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Jun 6, 2022Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆44Nov 29, 2024Updated last year
- nuke that event log using some epic dinvoke fu☆118May 12, 2021Updated 4 years ago
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated 2 months ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- ☆47Jan 31, 2024Updated 2 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- ☆26Aug 5, 2025Updated 7 months ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆28Apr 13, 2025Updated 10 months ago
- Execute commands in other Sessions☆91Jul 29, 2024Updated last year
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 2 years ago
- ☆24Feb 1, 2025Updated last year
- ☆84Aug 26, 2024Updated last year
- This tool, programmed in C#, allows for the fast discovery and exploitation of vulnerabilities in MSSQL servers☆55Jun 19, 2024Updated last year
- Halos Gate-based NTAPI Unhooker☆52Apr 21, 2022Updated 3 years ago
- Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.☆303Mar 4, 2020Updated 6 years ago
- Script to spider a website and find publicly open S3 buckets☆29Oct 1, 2020Updated 5 years ago
- NFS client written in Go☆103Apr 12, 2023Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- ☆31Jul 26, 2024Updated last year
- Cheat sheet of binary protections flags☆24Sep 6, 2020Updated 5 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- Plugins for the Serpico Project☆23Dec 4, 2018Updated 7 years ago
- FFXI Gearswap Lua for the impaired☆10Feb 2, 2026Updated last month
- A Crystal Palace shared library to resolve & perform syscalls☆57Oct 29, 2025Updated 4 months ago
- This Chromium extensions aims at supporting the analysis of single sign-on implementations, by offering semi-automated analysis and attac…☆29Jul 4, 2023Updated 2 years ago