Athena-OS / athena-repository
☆20Updated last year
Alternatives and similar repositories for athena-repository:
Users that are interested in athena-repository are comparing it to the libraries listed below
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last week
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆16Updated 9 months ago
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆47Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Official Athena OS docker base images.☆13Updated 3 months ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆12Updated this week
- Legba recipes.☆49Updated 8 months ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- Terminal based fake identity generator.☆26Updated last year
- Discord bot for the Shodan API - OSINT tool☆70Updated last year
- Multithread reverse shell listener☆24Updated last year
- Play Hack The Box directly on your system.☆47Updated last week
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- Pull Hashes Decryption From Online Sources Using Python☆16Updated 10 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆41Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Facial Recognition and its dangers for Special Forces Operatives☆24Updated last year
- A cyber security oriented interpreted programming language designed to make your experience with cyber security (offensive and defensive)…☆17Updated last year
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆20Updated 2 years ago
- Internal Network Penetration Test Playbook☆19Updated 3 years ago
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've…☆43Updated last year
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆24Updated 4 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆39Updated last year
- Tool for scanning domains for .git directories.☆16Updated last year
- Extendable Python script handler for automating penetration testing.☆39Updated 2 years ago