stealthcopter / deepceLinks
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
☆1,350Updated 5 months ago
Alternatives and similar repositories for deepce
Users that are interested in deepce are comparing it to the libraries listed below
Sorting:
- Identify privilege escalation paths within and across different clouds☆698Updated last month
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,385Updated this week
- Notes about attacking Jenkins servers☆2,072Updated last year
- Penelope Shell Handler☆993Updated last week
- WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used ag…☆1,571Updated 3 weeks ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,999Updated 11 months ago
- Peirates - Kubernetes Penetration Testing tool☆1,343Updated last week
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,414Updated 4 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,802Updated last year
- Hash type identifier (CLI & lib)☆890Updated this week
- Awesome cloud enumerator☆1,028Updated 4 months ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆857Updated 4 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,342Updated last week
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,046Updated this week
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,185Updated 6 months ago
- ☆682Updated this week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,458Updated 2 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,042Updated last month
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆629Updated 3 years ago
- A small reverse shell for Linux & Windows☆610Updated last year
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,688Updated 3 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,891Updated 3 weeks ago
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.☆1,565Updated last year
- Windows / Linux Local Privilege Escalation Workshop☆1,980Updated 2 years ago
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,192Updated 11 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,178Updated 4 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,876Updated 2 years ago
- A Python based ingestor for BloodHound☆2,196Updated 4 months ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆1,839Updated last month
- Collection of reverse shells for red team operations.☆507Updated 4 months ago