trickest / containers
Automated privilege escalation of the world's most popular Docker images.
☆66Updated last year
Alternatives and similar repositories for containers
Users that are interested in containers are comparing it to the libraries listed below
Sorting:
- A GraphQL enumeration and extraction tool☆131Updated 2 years ago
- ☆52Updated 6 months ago
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated last year
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- an Evil Java RMI Registry.☆50Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆64Updated 7 months ago
- ☆71Updated 3 years ago
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆36Updated 2 years ago
- ☆104Updated 2 years ago
- Fast and lightweight Web Application Firewall Fingerprinting tool☆62Updated 4 months ago
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆83Updated last month
- FastCVE - fast, rich and API-based search for CVE and more (CPE, CWE, CAPEC)☆49Updated 3 weeks ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- nuclei scanner for proxyshell ( CVE-2021-34473 )☆43Updated 2 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆29Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 7 months ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 3 months ago
- ☆35Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 2 years ago
- Backend for Nuclear Pond☆21Updated last year
- Dependency Confusion Security Testing Tool☆47Updated 2 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Updated last month
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- An Evil OIDC Server☆53Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- ☆166Updated 3 years ago
- One line command and control backdoors for APIs and web applications.☆50Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication☆36Updated 2 years ago