Lists (21)
Sort Name ascending (A-Z)
Active Directory Pwnage
85 repositories
AI / LLM
5 repositories
Cloud Pwnage
15 repositories
Cracking
31 repositories
Defending / Blue Team
50 repositories
Evasion
87 repositories
Hacking Labs
31 repositories
Honeypots
7 repositories
Infrastructure Pwnage
73 repositories
Linux Pwnage
9 repositories
Mobile Pwnage
21 repositories
OSINT / Enumeration
65 repositories
Phishing & Awareness
17 repositories
Privilege Escalation / Looting
53 repositories
Red Teaming
18 repositories
Reporting
4 repositories
SAP Hacking
6 repositories
SAST / DAST
7 repositories
Selfhosting / DevOPS
158 repositories
Web Pwnage
43 repositories
Wireless Hacking
2 repositories
Stars
6
stars
written in Dockerfile
Clear filter
Pre-Built Vulnerable Environments Based on Docker-Compose
Activate any version of Windows and Office, forever
Docker configuration to quickly setup your own Canarytokens.
Docker image and commands to check CVE-2019-11043 vulnerability on nginx/php-fpm applications.
Small docker image with ssss (Shamir's secret sharing scheme) based on Alpine linux.