stealthcopter / deepce
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
☆1,205Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for deepce
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,192Updated 3 months ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,672Updated 3 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,241Updated 5 months ago
- Identify privilege escalation paths within and across different clouds☆667Updated 2 weeks ago
- Notes about attacking Jenkins servers☆1,966Updated 4 months ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆2,820Updated 2 weeks ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,686Updated last month
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,795Updated 2 years ago
- Peirates - Kubernetes Penetration Testing tool☆1,243Updated last month
- Windows / Linux Local Privilege Escalation Workshop☆1,881Updated 2 years ago
- A collaborative, multi-platform, red teaming framework☆3,264Updated this week
- WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used ag…☆1,430Updated 5 months ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,443Updated 10 months ago
- A curated list of awesome privilege escalation☆1,233Updated 5 months ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,569Updated 2 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,739Updated 5 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,574Updated 2 months ago
- Awesome cloud enumerator☆894Updated 3 months ago
- Monitor linux processes without root permissions☆4,961Updated last year
- Penelope Shell Handler☆691Updated 3 weeks ago
- An OOB interaction gathering server and client library☆3,448Updated this week
- A Python based ingestor for BloodHound☆1,940Updated 3 months ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,296Updated 6 months ago
- pwning IPv4 via IPv6☆1,712Updated 9 months ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆798Updated last year
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,010Updated 7 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆1,802Updated last month
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,060Updated last week
- Abusing impersonation privileges through the "Printer Bug"☆1,872Updated 4 years ago
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,301Updated last week