PEzor-Docker : With The Help Of This Docker Image, You Can Easily Access PEzor On Your System!

PEzor-Docker, With the help of this incredible tool, you can create FUD malwares that are capable of bypassing most of the well-known AVs. For instance, you can pack the “mimikatz” executable file with the help of PEzor and then run it against victim’s system for a full mem dump without any problem!  How to use …

Dive : A Tool For Exploring Each Layer In A Docker Image

Dive is a tool for exploring a docker image, layer contents, and discovering ways to shrink the size of your Docker/OCI image. To analyze a Docker image simply run dive with an image tag/id/digest: dive <your-image-tag> or if you want to build your image then jump straight into analyzing it: dive build -t <some-tag> Building …

Web-Hacking-Toolkit : A Multi-Platform Web Hacking Toolkit Docker Image With Graphical User Interface (GUI) Support

Web-Hacking-Toolkit multi-platform web hacking toolkit Docker image with Graphical User Interface (GUI) support. Installation Docker Pull the image from Docker Hub: docker pull signedsecurity/web-hacking-toolkit Run a container and attach a shell: docker run \ -it \ –rm \ –shm-size=”2g” \ –name web-hacking-toolkit \ –hostname web-hacking-toolkit \ -p 22:22 \ -v $(pwd)/data:/root/data \ signedsecurity/web-hacking-toolkit \ /bin/bash …

BugBountyScanner : A Bash Script & Docker Image For Bug Bounty Reconnaissance

BugBountyScanner is a Bash script and Docker image for Bug Bounty reconnaissance, intended for headless use. Low on resources, high on information output. Note: Using the script over a VPN is highly recommended. It’s recommended to run BugBountyScanner from a server (VPS or home server), and not from your terminal. It is programmed to be …