Small enough to carry on your back (Backpack) ππ»
β32Jun 3, 2023Updated 2 years ago
Alternatives and similar repositories for BackBag-Lab-VM
Users that are interested in BackBag-Lab-VM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An exotic service bruteforce tool.β13Apr 12, 2025Updated last year
- πα΄ Κα΄Ι΄Ι’ Κα΄α΄ α΄Κsα΄ sΚα΄ΚΚπβ11Apr 28, 2022Updated 4 years ago
- The all-in-one Red Team extension for Web Pentester. Added more functionalityβ17Dec 21, 2021Updated 4 years ago
- Wrapper for TSK (Sleuth Kit) Bindingsβ12Jan 10, 2023Updated 3 years ago
- Parsers for common structures across windows formats.β12Aug 23, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- web application pentesting tools for dockerβ17Aug 9, 2022Updated 3 years ago
- Web-based GUI for TorBoxβ19Jun 13, 2023Updated 2 years ago
- Finding SSL Blindspots for Red Teamsβ34Jul 28, 2020Updated 5 years ago
- The long shadow to emerge as other Git repositoriesβ18Feb 25, 2026Updated 2 months ago
- Safe Rust API to libesedbβ12Sep 10, 2025Updated 8 months ago
- β12Sep 22, 2022Updated 3 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"β11Feb 6, 2025Updated last year
- Central IoC scanner based on Lokiβ20Nov 12, 2021Updated 4 years ago
- Remotely collect linux live forensics artifacts.β14Jul 8, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Command and Control that uses NTP as the transport protocol.β25Jan 29, 2022Updated 4 years ago
- β34Aug 8, 2023Updated 2 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applicaβ¦β22May 14, 2025Updated last year
- Another vulnerability scannerβ18Aug 9, 2025Updated 9 months ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.β15Apr 13, 2023Updated 3 years ago
- β33Feb 26, 2022Updated 4 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.β75Jan 18, 2022Updated 4 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.β19Jun 16, 2021Updated 4 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.β65Oct 18, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A wacky exploitation framework written in pure python3.β23Mar 24, 2024Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound mannerβ31Feb 27, 2026Updated 2 months ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view ofβ¦β10Dec 22, 2023Updated 2 years ago
- C# project to Reflectively load .Net assemblies in memoryβ19Jun 19, 2024Updated last year
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handlingβ11Oct 25, 2023Updated 2 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortexβ13Jan 29, 2020Updated 6 years ago
- Rust-based password mutator for brute force attacksβ13Mar 21, 2025Updated last year
- Base16 for Shellsβ19Jun 30, 2022Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentestingβ24Aug 13, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available β’ AdRun AI, ML, and HPC workloads on powerful cloud GPUsβwithout limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- x86_64 LKM linux rootkitβ16Jul 1, 2023Updated 2 years ago
- GoSniper is a DoS tool/DDoS tool.β22Aug 21, 2022Updated 3 years ago
- Anvil Secure's Burp extension for signing AWS requests with SigV4β22Aug 20, 2025Updated 9 months ago
- Random tips and tricks RE: ransomwareβ14Aug 17, 2021Updated 4 years ago
- Windows file metadata / forensic tool.β20Oct 12, 2025Updated 7 months ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.β19Jul 1, 2023Updated 2 years ago
- A collection of hacks and one-off scriptsβ11Apr 6, 2020Updated 6 years ago