Ansible Provisioned Security Testing Platform
☆17Oct 19, 2016Updated 9 years ago
Alternatives and similar repositories for attacksible
Users that are interested in attacksible are comparing it to the libraries listed below
Sorting:
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Offsec PWB Lab Tools☆13Nov 14, 2013Updated 12 years ago
- a pentesting/hacking script☆14Nov 27, 2015Updated 10 years ago
- Scripts for automating actions in Cobalt Strike☆11Jul 1, 2016Updated 9 years ago
- ☆43Jun 4, 2014Updated 11 years ago
- Collection of scanner checks missing in Burp☆15Apr 22, 2022Updated 3 years ago
- Bash script to download all lecture videos & notes for a particular course on Coursera.org.☆13Dec 25, 2015Updated 10 years ago
- Django Web UI contributed by Yandex for w3af.☆51Mar 17, 2015Updated 11 years ago
- Export your readability links to pocket☆20Sep 6, 2016Updated 9 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- Build scripts used to prepare self-contained packages of Arachni.☆13May 11, 2022Updated 3 years ago
- The MailChimp WordPress plugin allows you to quickly and easily add a signup form for your MailChimp list.☆32Apr 17, 2024Updated last year
- A set of vulnerable PHP scripts used to test w3af's vulnerability detection features.☆28Apr 15, 2015Updated 10 years ago
- Reverser - A Quick Reverse Connection Deployment Script☆12Jun 22, 2012Updated 13 years ago
- Python keylogger for Windows and linux/Xlib☆12May 3, 2016Updated 9 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Various Dockerfiles for different images☆14Nov 2, 2015Updated 10 years ago
- Recursively searches a directory for any file containing a specified string☆48Jul 5, 2015Updated 10 years ago
- A quick, dirty, and effective USB RubberDucky (hak5.com) firmware programming script. Cause typing is hard.☆20Jun 26, 2014Updated 11 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆35Mar 2, 2017Updated 9 years ago
- Fake Ap with Airssl script☆13Mar 15, 2015Updated 11 years ago
- A Docker container for Moloch based on minimal Debian☆26Jan 25, 2016Updated 10 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Jun 30, 2018Updated 7 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35May 7, 2015Updated 10 years ago
- An automated SMB relay exploitation script.☆153Oct 11, 2016Updated 9 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Mar 9, 2016Updated 10 years ago
- This ansible playbook will install a Debian / Ubuntu system on current server.☆13Apr 13, 2017Updated 8 years ago
- A Python command line argument to object parsing library for command line application development☆14Mar 23, 2016Updated 9 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Apr 22, 2022Updated 3 years ago
- Scripts and other goodies from the pwnieexpress project ported☆10Mar 16, 2014Updated 12 years ago
- Packet Sniffing in the Cloud☆35Feb 22, 2026Updated last month
- npm init for yeoman☆22Feb 11, 2024Updated 2 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Tool for performing lots of DNS queries quickly☆18May 29, 2015Updated 10 years ago
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- ☆10Jan 22, 2016Updated 10 years ago