KrakenEU / PenKrakenLinks
PenKraken, herramienta de automatizacion de hacking Etico / Pentesting
☆12Updated last year
Alternatives and similar repositories for PenKraken
Users that are interested in PenKraken are comparing it to the libraries listed below
Sorting:
- Msfvenom Advanced Obfuscated Payload Builder.☆27Updated 4 months ago
- Este script es una herramienta avanzada diseñada para administrar, crear y personalizar máquinas virtuales en entornos Docker, especialme…☆17Updated 8 months ago
- Herramienta para detectar correos de phishing mediante análisis DKIM, SPF, y WHOIS☆32Updated last year
- A comprehensive automation script for penetration testing and reconnaissance.☆42Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆175Updated last year
- wp-config-scan☆80Updated 2 years ago
- Despliega un entorno de hacking profesional para Kali Linux ejecutando solo un script.☆88Updated 2 months ago
- NetRadar is a Networking tool focused on mapping local and WiFi networks. It provides detailed information about connected devices, open …☆137Updated 2 years ago
- 🦝 Herramienta de anonimato extremo para Kali Linux. Cambia MAC, VPN, Tor, DNS, Restablece y limpia logs.☆58Updated 5 months ago
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆29Updated last year
- Tool for automate bug hunting process 🔍 --> 🍭☆46Updated 3 months ago
- Herramienta para hacking wifi con múltiples opciones.☆41Updated last year
- ☆128Updated 4 months ago
- To perform OSINT on an instagram profile☆80Updated 2 months ago
- Bug Bounty ultimate tool☆26Updated 3 months ago
- Proxmark guide☆19Updated 8 months ago
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆33Updated last year
- An auto-updating list of shodan dorks with info on the amount of results they return!☆279Updated this week
- Redirect All Traffic Through Tor Network For Kali Linux☆200Updated 6 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆98Updated 2 years ago
- ☆133Updated last year
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Updated 9 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆254Updated 6 months ago
- BlackRecon is an automated reconnaissance tool designed for ethical hacking and security assessments. It enumerates subdomains, resolves …☆16Updated 5 months ago
- PIP-INTEL is an OSINT (Open Source Intelligence) tool designed using various open-source tools and pip packages.☆179Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆156Updated 6 months ago
- reverse shell, Bypass windows defender firewall☆45Updated 11 months ago
- OriON is a virtual machine in Spanish that incorporates several tools for Open Source Intelligence (OSINT) on people.☆168Updated 6 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆240Updated 9 months ago
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆380Updated 4 months ago