santosomar / awesome-dockerView external linksLinks
A curated list of Docker resources and projects
☆16Nov 15, 2025Updated 2 months ago
Alternatives and similar repositories for awesome-docker
Users that are interested in awesome-docker are comparing it to the libraries listed below
Sorting:
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14Jan 11, 2026Updated last month
- This repository includes supplemental information covered in the Pearson video course titled "The Art of Hacking and Exploitation".☆21Jan 3, 2026Updated last month
- Cisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.☆31Oct 7, 2019Updated 6 years ago
- AI Security Research☆15Jun 21, 2023Updated 2 years ago
- A curated list of Awesome Threat Intelligence resources☆34Jan 12, 2018Updated 8 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆24Jun 13, 2023Updated 2 years ago
- UNTESTED Reaver-WPS command-line for Android. Not proven to work with bcm4329 chipset based phones, but should probably do on bcm4330. RE…☆13May 17, 2014Updated 11 years ago
- ☆14Updated this week
- Python web scraper for https://worldometers.info/coronavirus.☆10Dec 8, 2022Updated 3 years ago
- ☆21Jul 1, 2025Updated 7 months ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- A better way to write shell code☆10May 28, 2021Updated 4 years ago
- Emulate the AWS IoT Button on a Raspberry Pi with a simple push button using this C++ sample☆10Sep 16, 2016Updated 9 years ago
- This is a tool that can help you analyze WiFi networks. It can keep track of the network traffic and provide you with detailed informatio…☆12Apr 2, 2023Updated 2 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Nightscout Apple Watch viewer☆10Nov 18, 2015Updated 10 years ago
- NeMo: a toolkit for conversational AI☆12Dec 23, 2022Updated 3 years ago
- Optimize your Pwnagotchi experience with my easy-to-use script for on-the-go color inversion. Designed for Waveshare V3 and Pisugar 2/3, …☆11Jan 26, 2024Updated 2 years ago
- A deep dive into CVE-2025-49706 — the SharePoint spoofing flaw now exploited in the wild for stealthy web shell deployment and privilege …☆15Jul 20, 2025Updated 6 months ago
- PhoneGap NFC peer to peer demo☆22Jan 6, 2017Updated 9 years ago
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- GitHub Repository for the HW CWE SIG☆16Jan 21, 2026Updated 3 weeks ago
- 用于网站(HTTP)自动化判断开放和网页快照拍摄☆12Jan 25, 2021Updated 5 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- upload a manim script and generate an animation☆11Mar 10, 2024Updated last year
- ☆13Sep 2, 2019Updated 6 years ago
- Auto-Video maker handling many AI's☆11Mar 18, 2024Updated last year
- Blockchain and Smart Contract basic code for "mining" myself !!!☆13Jun 6, 2022Updated 3 years ago
- ☆13Jul 5, 2024Updated last year
- ☆12Apr 5, 2025Updated 10 months ago
- ebpf covert channel rootkit☆15Feb 6, 2024Updated 2 years ago
- A shell script for running lightning talks with a cow as a compere.☆15Jun 5, 2020Updated 5 years ago
- Localroot Privelege escalation for linux☆13Aug 5, 2024Updated last year
- ☆12Jun 4, 2025Updated 8 months ago