KaliPAKU is a training tool for penetration testing using Kali Linux. It is designed to help security professionals and engineers improve their skills and enhance their organization's security posture.
☆37Jul 31, 2023Updated 2 years ago
Alternatives and similar repositories for KaliPAKU
Users that are interested in KaliPAKU are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 3 years ago
- Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online persona…☆18Oct 16, 2024Updated last year
- ☆18Apr 3, 2023Updated 3 years ago
- ☆28Mar 31, 2023Updated 3 years ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated 11 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 9 months ago
- ☆11Jul 9, 2023Updated 2 years ago
- Archive of challenges @ Flatt Security Mini CTFs☆19Aug 20, 2025Updated 8 months ago
- ☆20Apr 5, 2023Updated 3 years ago
- ☆18Aug 20, 2023Updated 2 years ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆15Oct 22, 2025Updated 6 months ago
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 3 years ago
- Automated HTTP Request Repeating With Burp Suite☆39Apr 3, 2023Updated 3 years ago
- CDPwn is a python script designed to capture screenshots of files via the Chrome DevTools Protocol (CDP), a technique useful for privileg…☆14May 23, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆15Apr 5, 2023Updated 3 years ago
- ☆32Mar 21, 2023Updated 3 years ago
- Tool for efficient directory enumeration☆64Jan 27, 2026Updated 3 months ago
- Subtron is a professional grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆24Feb 14, 2026Updated 2 months ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated 3 months ago
- 脆弱性対応勉強会(Vulnerability Response Study Group)の資料です。☆23Apr 20, 2026Updated last week
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 3 years ago
- This repository is an overview of what resources you need in cybersecurity which we called infosec and a collection of hacking tools, res…☆21Nov 16, 2023Updated 2 years ago
- A DFIR tool to analyze artifacts on macOS☆35Jan 18, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Apr 2, 2026Updated 3 weeks ago
- A simple pentest container equipped with common python pentest tools.☆44Jan 30, 2026Updated 2 months ago
- HTTP Requests for security researchers☆64Jul 3, 2023Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆92Aug 11, 2024Updated last year
- Chakra Type Confusions - PoCs of Edge's legacy JS engine vulnerabilities that inject code into the JIT process☆16Mar 26, 2024Updated 2 years ago
- Tools used for Pentesting☆22Apr 21, 2023Updated 3 years ago
- ☆16Apr 21, 2023Updated 3 years ago
- CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script w…☆24Mar 18, 2023Updated 3 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Nuclei (https://github.com/projectdiscovery/nuclei) templates for extracting juicy info from web pages☆196Sep 7, 2023Updated 2 years ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆81Mar 8, 2024Updated 2 years ago
- A simple command line tool which quickly audits the Disallow entries of a site's robots.txt.☆23Apr 5, 2023Updated 3 years ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36May 27, 2023Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆60Apr 16, 2024Updated 2 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago