A collection of my Dockerfiles
☆90Dec 9, 2022Updated 3 years ago
Alternatives and similar repositories for dockerfiles
Users that are interested in dockerfiles are comparing it to the libraries listed below
Sorting:
- A collection of useful Serverless functions I use when pentesting☆391Dec 9, 2022Updated 3 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Jun 22, 2019Updated 6 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- A custom script I created because I got tired of installing my tools manually!☆15May 16, 2023Updated 2 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- ☆81Nov 2, 2019Updated 6 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- Silencing Sysmon via driver unload☆235Oct 13, 2022Updated 3 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- My musings with C#☆28Dec 23, 2022Updated 3 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Apr 22, 2018Updated 7 years ago
- Linux setup tool for Kali Linux☆81Sep 6, 2018Updated 7 years ago
- Dockerised Version of Frida☆21May 10, 2023Updated 2 years ago
- An Ansible role for installing Cobalt Strike.☆80Dec 22, 2025Updated 2 months ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆442Apr 1, 2022Updated 3 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- SSH spreading made easy for red teams in a hurry☆57Jan 1, 2024Updated 2 years ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Apr 4, 2019Updated 6 years ago
- Abusing Exchange via EWS☆152Sep 14, 2020Updated 5 years ago
- ☆58Jun 28, 2020Updated 5 years ago
- ☆122Mar 6, 2018Updated 7 years ago
- Burp Extension for AWS Signing☆90Jan 10, 2025Updated last year
- Docker container for running CobaltStrike 4.7 and above☆24Mar 20, 2025Updated 11 months ago
- Directory Fuzzer for Pentesting and Host Recon☆29Nov 10, 2018Updated 7 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆99May 8, 2019Updated 6 years ago
- ☆105Feb 11, 2026Updated 3 weeks ago
- DEFCON 27 slides and workshop materials.☆127Jun 29, 2020Updated 5 years ago
- Extension adds a new tab in Burp Suite called Extractor☆42Apr 13, 2019Updated 6 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago