A collection of my Dockerfiles
☆90Dec 9, 2022Updated 3 years ago
Alternatives and similar repositories for dockerfiles
Users that are interested in dockerfiles are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of useful Serverless functions I use when pentesting☆391Dec 9, 2022Updated 3 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- A custom script I created because I got tired of installing my tools manually!☆15May 16, 2023Updated 2 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Mar 4, 2020Updated 6 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Jun 22, 2019Updated 6 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆442Apr 1, 2022Updated 3 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- ☆22Mar 1, 2022Updated 4 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- ☆105Feb 11, 2026Updated last month
- My musings with C#☆28Dec 23, 2022Updated 3 years ago
- Abusing Exchange via EWS☆153Sep 14, 2020Updated 5 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Apr 22, 2018Updated 7 years ago
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- Yet another collection of Frida scripts.☆21Mar 6, 2022Updated 4 years ago
- Scripts to automate standing up C2 infra with firewall settings inside of DigitalOcean.☆18Feb 5, 2021Updated 5 years ago
- Pop shells like a master.☆1,491Apr 2, 2019Updated 6 years ago
- -☆11Nov 21, 2020Updated 5 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- Insecure Deserialization, PDF and lab☆18Nov 19, 2019Updated 6 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆527Apr 14, 2023Updated 2 years ago
- ☆81Nov 2, 2019Updated 6 years ago
- Native Java-based deserialization exploit for WebLogic T3 (and T3S) listeners.☆35Mar 2, 2020Updated 6 years ago
- An Ansible role for installing Cobalt Strike.☆80Mar 13, 2026Updated last week
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- Directory Fuzzer for Pentesting and Host Recon☆29Nov 10, 2018Updated 7 years ago
- Silencing Sysmon via driver unload☆236Oct 13, 2022Updated 3 years ago
- Some helpful Helm Charts for pentesters☆38Jan 28, 2019Updated 7 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- Dockerised Version of Frida☆21May 10, 2023Updated 2 years ago