Containerized pentesting tools
☆46May 9, 2022Updated 3 years ago
Alternatives and similar repositories for red-container
Users that are interested in red-container are comparing it to the libraries listed below
Sorting:
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- Ansible role that configures a host to be a target in a cyber range☆15Mar 17, 2019Updated 6 years ago
- Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits☆45May 9, 2022Updated 3 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- Moved to HappyHackingSpace/pirebok☆14Feb 11, 2026Updated 3 weeks ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- Dependency vulnerability auditor for Ruby☆13Jan 22, 2026Updated last month
- ☆11May 13, 2019Updated 6 years ago
- A very vulnerable implementation of a GraphQL API.☆17Feb 12, 2026Updated 2 weeks ago
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago
- Deploy certificates.☆15Aug 2, 2023Updated 2 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Jun 5, 2023Updated 2 years ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 4 months ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 5 months ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆15May 26, 2019Updated 6 years ago
- ☆15Jul 9, 2020Updated 5 years ago
- ☆20Sep 8, 2019Updated 6 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆16Mar 2, 2023Updated 3 years ago
- software asset scanning orchestration system☆34Feb 20, 2026Updated last week
- ☆14Jun 22, 2022Updated 3 years ago
- all published scripts devloped by ahmed khlief☆20Apr 3, 2020Updated 5 years ago
- ☆20Mar 21, 2024Updated last year
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Jun 5, 2023Updated 2 years ago
- Materials for a live workshop at BSidesSF on deployment-level Kubernetes security controls☆34May 19, 2022Updated 3 years ago
- 一个监控 pastebin 的敏感内容,并发微博的 bot☆15Sep 12, 2017Updated 8 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 9 years ago
- ☆17Jan 3, 2021Updated 5 years ago
- Various scripts to check for web applications, Linux OS etc vulnerabilities.☆20Jun 5, 2022Updated 3 years ago
- A tool that provides htop-like functionality for any point in time, utilizing the Spyderbat APIs☆23Mar 4, 2025Updated 11 months ago
- 微信支付宝个人收款码管理平台☆10Jun 17, 2020Updated 5 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- Confluence Widget Connector path traversal (CVE-2019-3396)☆22Oct 4, 2019Updated 6 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- GSA Security Benchmarks and Tools☆21Sep 19, 2019Updated 6 years ago
- scanver☆21Nov 13, 2018Updated 7 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Mar 21, 2023Updated 2 years ago