Automated privilege escalation of the world's most popular Docker images.
☆69Sep 25, 2023Updated 2 years ago
Alternatives and similar repositories for containers
Users that are interested in containers are comparing it to the libraries listed below
Sorting:
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- Find CVE PoCs on GitHub☆161Aug 1, 2025Updated 7 months ago
- Archive of Potential Insider Threats☆153Sep 25, 2023Updated 2 years ago
- ☆26Nov 7, 2023Updated 2 years ago
- ☆13Jan 4, 2022Updated 4 years ago
- List all public repositories for (valid) GitHub usernames☆76Sep 25, 2023Updated 2 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆29Apr 30, 2025Updated 10 months ago
- ☆20Jan 12, 2022Updated 4 years ago
- Combine words from two wordlist files and concatenate them with an optional delimiter☆39Sep 25, 2023Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 4 months ago
- Generate tens of thousands of subdomain combinations in a matter of seconds☆273Sep 25, 2023Updated 2 years ago
- Scan DockerHub images that match a keyword to find secrets.☆60Feb 17, 2021Updated 5 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆70Sep 25, 2023Updated 2 years ago
- ☆27Jul 30, 2021Updated 4 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆33Nov 12, 2025Updated 4 months ago
- A collection of one off hacks and simple scripts☆26Mar 21, 2023Updated 3 years ago
- Execute Trickest workflows right from your terminal☆99Nov 26, 2025Updated 3 months ago
- Security Blogs - A simple aggregator for security news/blog☆25Updated this week
- Filter and enrich a list of subdomains by level☆210Sep 25, 2023Updated 2 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- List your tfsec issues in the QuickFix window with this plugin.☆12May 16, 2022Updated 3 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- NTLM/Negotiate authentication over HTTP that supports Pass The Hash Mode (PtH)☆17Sep 13, 2024Updated last year
- Burp Bounty Lab provides a safe, local target to validate that your Burp Bounty Pro scanner profiles detect vulnerabilities correctly. It…☆40Updated this week
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 2 years ago
- 反取证程序,类似usbkill☆11Apr 22, 2023Updated 2 years ago
- ⚡Chrome extension allows you to create lists of Google and Github dork to open multiple tabs with one click, import "scope/out of scope" …☆137Dec 1, 2023Updated 2 years ago
- Will share some interesting writeups here :)☆18Oct 18, 2023Updated 2 years ago
- UAC-ByPass utils☆11Jan 28, 2022Updated 4 years ago
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31May 1, 2022Updated 3 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- Nuclei templates which I wrote myself☆10Jan 8, 2022Updated 4 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 6 months ago
- PowerShell script to generate ShellCode in various formats☆45Sep 25, 2024Updated last year