Lists (32)
Sort Name ascending (A-Z)
Automation
6 repositories
Automotive
Projects related to automotive1 repository
Azure
30 repositories
Blue team
Threat intelligence, security monitoring, SIEM, EDR68 repositories
C2
16 repositories
Cloud
Cloud audit tools, pentest tools46 repositories
Coding
1 repository
Containers
Containers, orchestration, Kubernetes31 repositories
CTI
9 repositories
CVE
20 repositories
Dorks
3 repositories
fuzzing
7 repositories
Hardware
3 repositories
Linux
16 repositories
Lists
10 repositories
Malware development
Courses, tools for evaison, bulding malware, etc.66 repositories
MCP
6 repositories
Misc
Crypto and other random stuff16 repositories
ML/AI
32 repositories
Mobile
5 repositories
Networking
15 repositories
OSINT
1 repository
Phishing
15 repositories
Purple team
5 repositories
Reconnaissance
Reconnaissance, OSINT44 repositories
Red team
240 repositories
Reporting
2 repositories
Source code analysis
17 repositories
Training
7 repositories
Web
36 repositories
Wifi
4 repositories
Windows
237 repositories
Stars
4
results
for source starred repositories
written in Dockerfile
Clear filter
Pre-Built Vulnerable Environments Based on Docker-Compose
Awesome list of step by step techniques to achieve Remote Code Execution on various apps!
Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.