Aegrah / kali_ansible_setupLinks
Ansible playbook for configuring Kali Linux to personal preferences
☆10Updated 3 years ago
Alternatives and similar repositories for kali_ansible_setup
Users that are interested in kali_ansible_setup are comparing it to the libraries listed below
Sorting:
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- External Playbooks for Public Access☆40Updated 10 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Information Security Information From Web☆28Updated 4 months ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆18Updated last month
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆29Updated last year
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆41Updated 2 years ago
- ☆65Updated 2 years ago
- ☆55Updated 10 months ago
- ☆66Updated 2 years ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- MayorSec DNS Enumeration Tool☆89Updated last year
- A Burp extension to help pentesters copy requests / responses for reports.☆50Updated 5 months ago
- OWASP based Web Application Security Testing Checklist☆80Updated last year
- ☆43Updated 7 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Updated 3 years ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- ☆74Updated last week
- ☆27Updated 2 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆47Updated 5 months ago
- Upload files done during my research.☆167Updated last week
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆72Updated last year
- Web Hacking and Red Teaming MindMap☆78Updated last month
- ☆47Updated 9 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- Next generation fireprox AWS API endpoint creation utility.☆56Updated 3 years ago