awesome-privilege-escalation VS offensive-docker

Compare awesome-privilege-escalation vs offensive-docker and see what are their differences.

offensive-docker

Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets. (by aaaguirrep)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
awesome-privilege-escalation offensive-docker
2 1
1,114 709
- -
5.6 0.0
about 2 months ago about 2 years ago
Dockerfile
- MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

awesome-privilege-escalation

Posts with mentions or reviews of awesome-privilege-escalation. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-11-29.

offensive-docker

Posts with mentions or reviews of offensive-docker. We have used some of these posts to build our list of alternatives and similar projects.
  • Is There A Way To Have A Docker With Persistent
    1 project | /r/docker | 28 Dec 2020
    This will work if /u/nopa1es has their own dockerfile referencing aaaguirrep/offensive-docker. If they run docker build on https://github.com/aaaguirrep/offensive-docker/blob/master/Dockerfile (which is one of the two given "how to run" methods in the docs) I would not bet on caching. That dockerfile has at least 11 build stages depending on each other (e.g. FROM ubuntu as baseline ... FROM baseline as builder ... 8 more times ... FROM builder9 as builder10) and the baseline stage installs 1000+ packages with apt. In additional the subsequent stages make liberal use of pip install, git clone and go get

What are some alternatives?

When comparing awesome-privilege-escalation and offensive-docker you can also consider the following projects:

Captcha-Bypassing-Lab - PHP lab to test captcha bypassing

Resources-for-Beginner-Bug-Bounty-Hunters - A list of resources for those interested in getting started in bug bounties

kashz-jewels - Gitbook: kashz-Jewels

lit-bb-hack-tools - Little Bug Bounty & Hacking Tools⚔️

HijackLibs - Project for tracking publicly disclosed DLL Hijacking opportunities.

caido - 🚀 Caido releases, wiki and roadmap

PayloadsAllTheThings - A list of useful payloads and bypass for Web Application Security and Pentest/CTF

WhatWeb - Next generation web scanner

linux-smart-enumeration - Linux enumeration tool for pentesting and CTFs with verbosity levels

turbo-attack - A turbo traffic generator pentesting tool to generate random traffic with random mac and ip addresses in addition to random sequence numbers to a particular ip and port.

post-exploitation - Post Exploitation Collection

favirecon - Use favicon.ico to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.