d(ockerp)wn - a docker pwn tool manager
☆156Jun 8, 2021Updated 4 years ago
Alternatives and similar repositories for dwn
Users that are interested in dwn are comparing it to the libraries listed below
Sorting:
- ☆108Oct 14, 2021Updated 4 years ago
- ☆17Aug 3, 2021Updated 4 years ago
- macOS persistence tool☆229Feb 9, 2022Updated 4 years ago
- WireBug is a toolset for Voice-over-IP penetration testing☆174Mar 30, 2022Updated 3 years ago
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- A polyglot payload generator☆242Aug 15, 2022Updated 3 years ago
- Red Team C code repo☆568Dec 16, 2024Updated last year
- Routopsy - Hacking Routers with Routers☆179Jul 30, 2021Updated 4 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Mar 2, 2021Updated 5 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Oct 22, 2020Updated 5 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆235Feb 15, 2021Updated 5 years ago
- Your everyday Linux distribution gone Super Saiyan.☆62Oct 13, 2023Updated 2 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Mar 11, 2021Updated 4 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- Static code analysis tool based on Elasticsearch☆129Jan 23, 2021Updated 5 years ago
- ☆272Jul 10, 2023Updated 2 years ago
- Overlord - Red Teaming Infrastructure Automation☆628May 28, 2024Updated last year
- string encryption in Nim☆20Jun 15, 2024Updated last year
- your bestfried for finding LinkedIn Employees on github☆15Mar 28, 2023Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆38Dec 20, 2020Updated 5 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆820Oct 27, 2023Updated 2 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Apr 14, 2023Updated 2 years ago
- Tool to manipulate and weaponize Office Open XML documents.☆71Mar 27, 2023Updated 2 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Sep 13, 2023Updated 2 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Pass the Hash to a named pipe for token Impersonation☆146May 1, 2021Updated 4 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆381Feb 1, 2024Updated 2 years ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- PowerShell SOCKS proxy with reverse proxy capabilities☆84Apr 23, 2021Updated 4 years ago
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆426Apr 22, 2021Updated 4 years ago
- ☆84Aug 26, 2024Updated last year
- Hide your payload in DNS☆615May 3, 2023Updated 2 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Nov 14, 2020Updated 5 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Mar 15, 2021Updated 4 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- NOSNEX - Remake of fluxion for nethunter support☆10Jan 27, 2021Updated 5 years ago