PenKraken, herramienta de automatizacion de hacking Etico / Pentesting
☆13Jun 14, 2024Updated last year
Alternatives and similar repositories for PenKraken
Users that are interested in PenKraken are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cosas copypaste☆14Jun 29, 2023Updated 2 years ago
- Vault de Obsidian Apuntes BSCP (Suscribete a Kr4k3nEU chaval)☆22May 31, 2024Updated last year
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆16Jun 2, 2025Updated 11 months ago
- HackTheBox rich presence for Discord☆14May 30, 2024Updated last year
- Two simple plugins for wireshark that can help in Network Forensics CTFs☆12Apr 21, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A Python tool to scan JavaScript files for sensitive information exposure, helping security researchers identify potential leaks of API k…☆16Feb 17, 2026Updated 2 months ago
- Log-Zapper is a linux and windows secure Log cleaner.☆22Jun 15, 2024Updated last year
- Proxmark guide☆21Feb 7, 2025Updated last year
- Script for importing Nmap results into a Neo4j Graph Database☆24May 1, 2025Updated last year
- Msfvenom Advanced Obfuscated Payload Builder.☆32Jun 2, 2025Updated 11 months ago
- ☆19Aug 2, 2025Updated 9 months ago
- A threat modeling tool that implements the Trike v2 methodology in Smalltalk☆17Nov 18, 2019Updated 6 years ago
- Configuration files for desktop environment☆24Feb 20, 2024Updated 2 years ago
- rMETAshell takes a shell command and an image, video or text file as input. It then injects the command into the file using metadata comm…☆30Jan 25, 2026Updated 3 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Herramienta para detectar correos de phishing mediante análisis DKIM, SPF, y WHOIS☆33Aug 13, 2024Updated last year
- A Python extension for getting RandomX hashes.☆34Aug 15, 2024Updated last year
- A comprehensive automation script for penetration testing and reconnaissance.☆43Jul 29, 2024Updated last year
- ☆60Jan 4, 2024Updated 2 years ago
- [ARCHIVED] Early work on Benthic (Windows Kernel Rootkit).☆59Aug 15, 2025Updated 8 months ago
- Cisco Certified CyberOps Associate 200-201 Certification Guide, published by Packt☆29Jan 30, 2023Updated 3 years ago
- ☆27Jul 2, 2024Updated last year
- ☆28Sep 7, 2025Updated 8 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆259Apr 3, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Despliega un entorno de hacking profesional para Kali Linux ejecutando solo un script.☆108Aug 1, 2025Updated 9 months ago
- Minimalist notes for CEH-practical Cert.☆40Jul 19, 2022Updated 3 years ago
- Roadmap for cybersecurity beginners.☆30Jul 19, 2023Updated 2 years ago
- A terminal-based AI assistant for Linux sysadmins.☆38Mar 20, 2026Updated last month
- ☆67Feb 10, 2025Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆164Aug 28, 2025Updated 8 months ago
- Core-Termux, Automates the setup of a web development environment in Termux, enabling developers to quickly start building web applicatio…☆210Updated this week
- ☆14Nov 8, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆14Aug 20, 2024Updated last year
- The purpose of this repository is to concentrate information, concepts and studies for the Certified in Cybersecurity (ISC²) exam.☆52Apr 18, 2023Updated 3 years ago
- Shell Utils is an educational framework designed to make shell programming accessible and powerful. It is the result of extensive work ov…☆13May 3, 2026Updated last week
- H0tmCheck: email checking sin ruido, sin basura, solo resultados.☆18Dec 14, 2025Updated 4 months ago
- FindME is a CLI tool for searching social media and online profiles linked to a username. It’s ideal for reconnaissance, digital footprin…☆273Dec 1, 2025Updated 5 months ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- Sencilla aplicación hecha en python con interfaz gráfica para dejar sin conexión a un host dentro de mi red.☆92Feb 8, 2025Updated last year