stealthcopter / deepceLinks
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
☆1,365Updated 6 months ago
Alternatives and similar repositories for deepce
Users that are interested in deepce are comparing it to the libraries listed below
Sorting:
- Identify privilege escalation paths within and across different clouds☆699Updated 2 months ago
- Penelope Shell Handler☆1,027Updated this week
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,411Updated 3 weeks ago
- Notes about attacking Jenkins servers☆2,072Updated last year
- Hash type identifier (CLI & lib)☆894Updated this week
- WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used ag…☆1,590Updated this week
- Peirates - Kubernetes Penetration Testing tool☆1,352Updated 2 weeks ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,418Updated 4 months ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,026Updated last year
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,189Updated 6 months ago
- ☆685Updated this week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,461Updated 2 years ago
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,206Updated last year
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.☆1,569Updated last year
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆858Updated 5 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,047Updated 2 months ago
- Awesome cloud enumerator☆1,035Updated 5 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,805Updated last year
- Convolutional neural network for analyzing pentest screenshots☆1,234Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,053Updated last week
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,211Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,790Updated 3 months ago
- bypass-url-parser☆1,085Updated this week
- Fancy reverse and bind shell handler☆2,796Updated last year
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,351Updated 2 weeks ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,907Updated last month
- A Python based ingestor for BloodHound☆2,205Updated this week
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,252Updated 3 months ago
- ☆214Updated 5 years ago
- This project is aimed at freely providing technical guides on various hacking topics.☆915Updated last month