Containerized pentesting tools
☆46May 9, 2022Updated 3 years ago
Alternatives and similar repositories for red-container
Users that are interested in red-container are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ansible role that configures a host to be a target in a cyber range☆15Mar 17, 2019Updated 7 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- Ansible role for security standards compliance☆13Mar 6, 2019Updated 7 years ago
- Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits☆45May 9, 2022Updated 3 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Jun 9, 2022Updated 3 years ago
- Moved to HappyHackingSpace/pirebok☆14Feb 11, 2026Updated last month
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- ☆15Jul 9, 2020Updated 5 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 6 months ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Jul 10, 2018Updated 7 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Jun 5, 2023Updated 2 years ago
- ☆14Jun 22, 2022Updated 3 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- ☆11May 13, 2019Updated 6 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Nov 22, 2022Updated 3 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- Linux AV tests☆13Apr 23, 2019Updated 6 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Jun 5, 2023Updated 2 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆15May 26, 2019Updated 6 years ago
- ☆17Jan 3, 2021Updated 5 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Jul 26, 2020Updated 5 years ago
- all published scripts devloped by ahmed khlief☆20Apr 3, 2020Updated 5 years ago
- 基于深度学习的cms识别 训练集☆16Sep 22, 2018Updated 7 years ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 4 months ago
- A very vulnerable implementation of a GraphQL API.☆17Mar 13, 2026Updated last week
- ☆17Feb 16, 2024Updated 2 years ago
- Blockchain and Smart Contract basic code for "mining" myself !!!☆13Jun 6, 2022Updated 3 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 5 years ago
- 一个监控 pastebin 的敏感内容,并发微博的 bot☆15Sep 12, 2017Updated 8 years ago
- scanver☆21Nov 13, 2018Updated 7 years ago