Pentesting/Bugbounty Dockerfiles.
☆176May 29, 2021Updated 4 years ago
Alternatives and similar repositories for pentesting-dockerfiles
Users that are interested in pentesting-dockerfiles are comparing it to the libraries listed below
Sorting:
- Various Payload wordlists☆240Apr 26, 2025Updated 10 months ago
- ☆73Nov 5, 2018Updated 7 years ago
- ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.☆727May 6, 2022Updated 3 years ago
- Perform operations on URLs like extracting paths, parameter names and/or values, domain name, host name (without HTTP[s]).☆29Aug 19, 2020Updated 5 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Apr 26, 2020Updated 5 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- Subdomain Enumeration Wordlist. 8956437 unique words. Updated.☆75May 23, 2020Updated 5 years ago
- Automated Red Team Infrastructure deployement using Docker☆1,261Aug 24, 2022Updated 3 years ago
- ☆36Jul 11, 2018Updated 7 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- BBT - Bug Bounty Tools (examples💡)☆1,883Apr 5, 2024Updated last year
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆642Jul 7, 2025Updated 7 months ago
- Collection of content discovery wordlists in one wordlist.☆38Jan 18, 2022Updated 4 years ago
- Damn Vulnerable WordPress☆198Dec 23, 2023Updated 2 years ago
- The commands and scripts I used in the Live Recon Village talks☆37Mar 14, 2021Updated 4 years ago
- A tool to test working urls.☆43Nov 17, 2020Updated 5 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- ☆17Aug 3, 2021Updated 4 years ago
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modules☆187Oct 30, 2021Updated 4 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,350Sep 30, 2024Updated last year
- Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures t…☆213Mar 31, 2020Updated 5 years ago
- QuickSQL is a simple MSSQL query tool that allows you to connect to MSSQL databases and does not require administrative level rights to u…☆103Apr 17, 2020Updated 5 years ago
- Scan Victim Backup Directories & Backup Files☆182Sep 25, 2023Updated 2 years ago
- PwnMachine is a self hosting solution based on docker aiming to provide an easy to use pwning station for bug hunters.☆324Jul 31, 2024Updated last year
- Weaponizing Live CT logs for automated monitoring of assets☆134Sep 12, 2021Updated 4 years ago
- Windows 10 De-Clutter script☆25Jul 5, 2020Updated 5 years ago
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆303Feb 12, 2023Updated 3 years ago
- Pentest/BugBounty progress control with scanning modules☆281Jul 16, 2020Updated 5 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- Get all the CNs from a list of domains☆45Aug 17, 2021Updated 4 years ago
- Quick and dirty dynamic redirect.rules generator☆170Oct 12, 2022Updated 3 years ago
- bash scripting thing!☆193Nov 13, 2023Updated 2 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Send notifications on different channels such as Slack, Telegram, Discord etc.☆39Jan 12, 2026Updated last month
- ASN target organization IP range attack surface mapping for reconnaissance, fast and lightweight☆220Apr 10, 2022Updated 3 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Nov 6, 2022Updated 3 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆258Sep 18, 2022Updated 3 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆91May 10, 2020Updated 5 years ago