santosomar / awesome-dockerLinks
A curated list of Docker resources and projects
☆15Updated last year
Alternatives and similar repositories for awesome-docker
Users that are interested in awesome-docker are comparing it to the libraries listed below
Sorting:
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆11Updated last month
- Learning-Pentesting-With-Python☆21Updated 6 years ago
- A curated list of GPT agents for cybersecurity☆10Updated 8 months ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆15Updated 3 years ago
- home! sweet home☆23Updated 5 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- ☆22Updated 8 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated 2 years ago
- Skills To Improve Before Heading to OSCP☆15Updated 8 years ago
- buffer overflow examples☆22Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- ☆33Updated 5 months ago
- A curated list of awesome Python frameworks, libraries, software and resources☆11Updated 7 months ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- Automated Penetration Testing☆14Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Updated 4 years ago
- ☆18Updated last year
- OSCP Focused Lab Pastable with some general Red Teaming Pastables.☆10Updated 5 years ago
- A list of universities with vulnerability disclosure policies☆12Updated 4 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- A curated list of awesome threat detection and hunting resources☆18Updated 6 years ago
- Python driver for Wappalyzer, a web application detection utility.☆10Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆53Updated 7 years ago
- Simple scripts aiding penetration testing process☆14Updated 5 years ago
- only for 31337☆23Updated 8 years ago
- A formula to calculate bounty amounts.☆14Updated 7 years ago
- Open Penetration Testing Bookmarks Collection☆19Updated 10 years ago
- This is a beginner level session to train you into using SSH more effectively. While pentesters may benefit (especially if they are plan…☆15Updated 6 years ago