singe / container-breakouts
Testing/collecting some container breakouts
☆93Updated 5 years ago
Alternatives and similar repositories for container-breakouts:
Users that are interested in container-breakouts are comparing it to the libraries listed below
- Scan for and exploit Consul agents☆40Updated 5 years ago
- ☆122Updated 6 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆78Updated 8 months ago
- Common Findings Database☆100Updated 5 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆98Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 6 years ago
- WhiteBox CMS analysis☆69Updated last year
- Exfiltrate files via DNS☆96Updated 11 years ago
- ☆51Updated 8 years ago
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆102Updated 6 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 2 months ago
- ☆89Updated 7 years ago
- Burp Suite extension to perform Kerberos authentication☆104Updated 7 months ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆82Updated 4 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- ☆61Updated 6 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- TLS Redirection☆120Updated 7 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Slides from various talks that I've given over the years☆117Updated last year
- Easy 802.1Q VLAN Hopping☆80Updated 6 months ago