#
I may be slow to respond.
Offensive Security: Information Security Solutions, Digital Forensics, Offensive Security Courses, Content Production, and Bug Bounty Hunting!
Lists (1)
Sort Name ascending (A-Z)
- All languages
- ASP
- Assembly
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- Crystal
- Dockerfile
- Erlang
- F#
- Game Maker Language
- Go
- Groovy
- HCL
- HTML
- Hack
- Haskell
- Inno Setup
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- Meson
- Nim
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Ruby
- Rust
- Shell
- Smali
- Swift
- TypeScript
- Visual Basic
- Vue
- YARA
- Zig
Starred repositories
8
stars
written in Dockerfile
Clear filter
Pre-Built Vulnerable Environments Based on Docker-Compose
Awesome list of step by step techniques to achieve Remote Code Execution on various apps!
19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNE…
Use HTTP Smuggling Lab to learn HTTP Smuggling.
Docker Swarm - Promitheus, Grafana, Node Exporter, Loki, Promtail, Caddy
XSS scanning with Dalfox on Github-action