trickest / containers
Automated privilege escalation of the world's most popular Docker images.
☆62Updated last year
Related projects ⓘ
Alternatives and complementary repositories for containers
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 2 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- an Evil Java RMI Registry.☆45Updated last year
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 2 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆14Updated 7 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆21Updated 2 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆45Updated 2 months ago
- A collection of my Semgrep rules☆47Updated last year
- Simple PoC for demonstrating Race Conditions on Websockets☆56Updated last year
- 2022 CTF public release☆24Updated 2 years ago
- Fast and lightweight Web Application Firewall Fingerprinting tool☆61Updated last year
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆33Updated 2 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- ☆50Updated 2 weeks ago
- masscan with exclusive excludes☆55Updated last year
- A collection of utilities for building extensions using Burp's Montoya API☆46Updated 5 months ago
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆82Updated 6 months ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆42Updated last year
- Vulnerable code snippets repository showcasing different vulnerabilities to practice code analysis skills.☆22Updated last year
- ☆31Updated last year
- A GraphQL enumeration and extraction tool☆128Updated last year
- An Evil OIDC Server☆51Updated 2 years ago
- Make better use of the embedded browser that comes by default with Burp☆38Updated 10 months ago
- Simple WebSocket fuzzer☆32Updated last year
- ElasticSearch exploit and Pentesting guide for penetration tester☆22Updated 2 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆50Updated 3 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago