Hi everyone, me and my team use Docker for a lot of stuff because we like to have something that "just works". So we thought to collect, reorder and manage a lot Docker images for hacking and bug bounty purposes. Here are the references:
- Official website: https://houdini.secsi.io
- Medium post: https://thelicato.medium.com/dockerize-your-hacking-workflow-c61410af1c64
- Source Code: https://github.com/cybersecsi/HOUDINI
[link] [comments]
from hacking: security in practice https://ift.tt/Jo3nvpI
Comments
Post a Comment