stealthcopter / deepce
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
☆1,230Updated 7 months ago
Alternatives and similar repositories for deepce:
Users that are interested in deepce are comparing it to the libraries listed below
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,228Updated 5 months ago
- Notes about attacking Jenkins servers☆2,018Updated 6 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,813Updated 2 years ago
- Identify privilege escalation paths within and across different clouds☆676Updated 2 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,271Updated 2 weeks ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,747Updated 4 months ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,138Updated 6 months ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,032Updated last year
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,599Updated 2 years ago
- A collaborative, multi-platform, red teaming framework☆3,373Updated 2 weeks ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,490Updated last year
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆616Updated 3 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,858Updated this week
- pwning IPv4 via IPv6☆1,747Updated 10 months ago
- Fancy reverse and bind shell handler☆2,674Updated 5 months ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,324Updated 3 weeks ago
- Penelope Shell Handler☆748Updated this week
- Tool for Active Directory Certificate Services enumeration and abuse☆2,514Updated 4 months ago
- Peirates - Kubernetes Penetration Testing tool☆1,260Updated last week
- Next-Generation Linux Kernel Exploit Suggester☆1,873Updated last year
- Abusing impersonation privileges through the "Printer Bug"☆1,910Updated 4 years ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,049Updated 2 weeks ago
- Automatic Enumeration Tool based in Open Source tools☆903Updated last year
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆493Updated 3 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,563Updated 4 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,042Updated 9 months ago
- A curated list of awesome privilege escalation☆1,257Updated 7 months ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,047Updated 7 months ago
- Awesome cloud enumerator☆934Updated 5 months ago
- ☆1,072Updated 3 years ago