Docker Registry UiThe simplest and most complete UI for your private registry
Stars: ✭ 756 (-27.72%)
cleanregA small tool to clean up Docker Registries (v2).
Stars: ✭ 48 (-95.41%)
craneoperatorGives you a simple web interface for browsing around a Docker Registry
Stars: ✭ 116 (-88.91%)
ttl.shAn anonymous & ephemeral Docker image registry
Stars: ✭ 107 (-89.77%)
PieroneSTUPS' Docker registry with S3 backend, immutable tags and SCM source tracking
Stars: ✭ 57 (-94.55%)
ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-86.42%)
Login Action GitHub Action to login against a Docker registry
Stars: ✭ 149 (-85.76%)
Registry CliScripts for easy manipulation of docker-registry from command line (and from scripts)
Stars: ✭ 609 (-41.78%)
Docker registry cliDocker Registry CLI - Provides search functionality for Docker Registry (UI and CLI)
Stars: ✭ 48 (-95.41%)
Scan TensorflowA Tensorflow implementation of DeepMind's Symbol-Concept Association Network(SCAN: Learning Abstract Hierarchical Compositional Visual Concepts)
Stars: ✭ 39 (-96.27%)
SpeedhackSpeedhack coded in C++, inspired by Cheat Engine's own speedhack.
Stars: ✭ 29 (-97.23%)
KeyloggerA simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (-3.73%)
Swift KeyloggerKeylogger for mac written in Swift using HID
Stars: ✭ 995 (-4.88%)
WsshWSSH Is a tool for brute forcing servers that has port 22 open via ssh, wssh is probably the fastest ssh brute forcer available
Stars: ✭ 21 (-97.99%)
BlackwidowA Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.
Stars: ✭ 887 (-15.2%)
Awesome HackingA curated list of awesome Hacking tutorials, tools and resources
Stars: ✭ 7,756 (+641.49%)
Cfw2ofw HelperProviding aid in converting video games.
Stars: ✭ 44 (-95.79%)
BrutexAutomatically brute force all services running on a target.
Stars: ✭ 974 (-6.88%)
Reverse EngineeringThis repository contains some of the executables that I've cracked.
Stars: ✭ 29 (-97.23%)
Tic TacClient not paid ? This is the solution of your problem
Stars: ✭ 29 (-97.23%)
Usb Keystroke Injector☠️ An Arduino-based USB keyboard simulator which injects keystrokes via Bluetooth protocol or predefined payloads in a SD card.
Stars: ✭ 42 (-95.98%)
CatchmeCatchME - WiFi Fun Box "Having Fun with ESP8266"
Stars: ✭ 28 (-97.32%)
RegslscanA tool for scanning registery key permissions. Find where non-admins can create symbolic links.
Stars: ✭ 39 (-96.27%)
TaikTool hack Dark FB tanpa lisensi
Stars: ✭ 21 (-97.99%)
BroxyAn HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (-12.81%)
PowerladonLadon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Stars: ✭ 39 (-96.27%)
DcaDocker Certified Associate Exam Preparation Guide
Stars: ✭ 883 (-15.58%)
TaketvTakeTV permite descubrir dispositivos de red DLNA/UPnP y ayuda a reproducir archivos multimedia en los televisores inteligentes desde nuestra terminal en Linux.
Stars: ✭ 41 (-96.08%)
Cve 2017 0199 FixQuick and dirty fix to OLE2 executing code via .hta
Stars: ✭ 14 (-98.66%)
Dkregistry RsA pure-Rust asynchronous library for Docker Registry API v2
Stars: ✭ 35 (-96.65%)
Drv3 Tools(Not actively maintained, use DRV3-Sharp) Tools for extracting and re-injecting files for Danganronpa V3 for PC.
Stars: ✭ 13 (-98.76%)
Best Hacking ToolsBEST HACKING TOOLS..For more tools visit our blog for Hackers
Stars: ✭ 46 (-95.6%)
Kubernetes GoatKubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
Stars: ✭ 868 (-17.02%)
ShuffleWebShell Backdoor Framework
Stars: ✭ 11 (-98.95%)
DracnmapDracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (-17.69%)
Arpspoof arpspoof for macOS - intercept packets on a switched LAN
Stars: ✭ 40 (-96.18%)
100 Days Of Swiftui👨💻👩💻100 Days Of SwiftUI free course from Hacking with Swift. 👨💻👩💻
Stars: ✭ 35 (-96.65%)
EnvtoolUtility to check and search along environment variables. Or where Python/Cmake/Man-pages/pkg-modules/VCPKG-packages are located.
Stars: ✭ 10 (-99.04%)
PhonesploitUsing open Adb ports we can exploit a Andriod Device
Stars: ✭ 854 (-18.36%)
V3n0m ScannerPopular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (-19.02%)
Crazy WeekendMengobati rasa ingin tahu atau kadang hanya iseng
Stars: ✭ 9 (-99.14%)
WatchtowerA process for automating Docker container base image updates.
Stars: ✭ 9,526 (+810.71%)
Pwn jenkinsNotes about attacking Jenkins servers
Stars: ✭ 841 (-19.6%)
Badusb botnet👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-96.94%)