DeadPackets / pwnbox
A Kali-based docker container pre-built with tools, ZSH, and SSH.
☆17Updated 5 months ago
Alternatives and similar repositories for pwnbox:
Users that are interested in pwnbox are comparing it to the libraries listed below
- a curated list of shodan dorks for finding sensitive data in shodan.io☆28Updated 9 months ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆20Updated 2 years ago
- Script to facilitate different functions and checks☆46Updated 2 years ago
- Upgrade kali linux default installation☆14Updated last week
- A Simple Script For SSH BruteForce☆36Updated last year
- Automated sqlmap☆21Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 6 years ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 6 years ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Updated 2 years ago
- Information Gathering Simplified.☆64Updated 2 years ago
- DASH is deep osint Scanner. You just need username to start osint scan.☆48Updated 2 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆39Updated last year
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆17Updated last year
- Phishing Reverse Proxy with MFA bypass☆17Updated 2 years ago
- Leakix Searcher☆14Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆17Updated 2 years ago
- Python3 script to dump breach data from Dehashed☆28Updated 9 months ago
- Python RAT with reverse connection and asymmetric encrypted communications☆16Updated 4 years ago
- Anubis 7.0☆25Updated 6 months ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆60Updated 3 years ago
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆33Updated 2 years ago
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆53Updated last month
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆15Updated 5 years ago
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆21Updated 3 years ago
- Repository of tools used in my blog☆51Updated last year
- ☆14Updated 2 years ago
- Simple script to bulk check if IPs match networks☆12Updated 3 years ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- Powerful and smart Traffic Anonymizer using tor as a transparent proxy☆31Updated 2 years ago