stealthcopter / deepceLinks
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
☆1,396Updated 8 months ago
Alternatives and similar repositories for deepce
Users that are interested in deepce are comparing it to the libraries listed below
Sorting:
- Identify privilege escalation paths within and across different clouds☆705Updated 2 months ago
- Penelope Shell Handler☆1,133Updated last week
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,452Updated last month
- Notes about attacking Jenkins servers☆2,083Updated last year
- Peirates - Kubernetes Penetration Testing tool☆1,364Updated 2 months ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,434Updated 6 months ago
- Hash type identifier (CLI & lib)☆913Updated last month
- Awesome cloud enumerator☆1,051Updated 7 months ago
- ☆703Updated last week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,465Updated 3 years ago
- WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used ag…☆1,610Updated last month
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,226Updated last year
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆868Updated 7 months ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,201Updated 8 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,080Updated this week
- bypass-url-parser☆1,094Updated last week
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.☆1,570Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,816Updated last year
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,108Updated last month
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,943Updated 3 months ago
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆1,000Updated 2 years ago
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,285Updated 5 months ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,093Updated last year
- Convolutional neural network for analyzing pentest screenshots☆1,249Updated last year
- Fancy reverse and bind shell handler☆2,827Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,975Updated 5 months ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆625Updated this week
- A small reverse shell for Linux & Windows☆613Updated last year
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆638Updated 2 months ago
- Automatic Enumeration Tool based in Open Source tools☆965Updated last year