PenKraken, herramienta de automatizacion de hacking Etico / Pentesting
☆13Jun 14, 2024Updated last year
Alternatives and similar repositories for PenKraken
Users that are interested in PenKraken are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cosas copypaste☆14Jun 29, 2023Updated 2 years ago
- Vault de Obsidian Apuntes BSCP (Suscribete a Kr4k3nEU chaval)☆22May 31, 2024Updated last year
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆16Jun 2, 2025Updated 10 months ago
- HackTheBox rich presence for Discord☆13May 30, 2024Updated last year
- Two simple plugins for wireshark that can help in Network Forensics CTFs☆12Apr 21, 2025Updated 11 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A Python tool to scan JavaScript files for sensitive information exposure, helping security researchers identify potential leaks of API k…☆16Feb 17, 2026Updated 2 months ago
- Log-Zapper is a linux and windows secure Log cleaner.☆22Jun 15, 2024Updated last year
- Proxmark guide☆21Feb 7, 2025Updated last year
- Script for importing Nmap results into a Neo4j Graph Database☆24May 1, 2025Updated 11 months ago
- Msfvenom Advanced Obfuscated Payload Builder.☆32Jun 2, 2025Updated 10 months ago
- ☆20Aug 2, 2025Updated 8 months ago
- A threat modeling tool that implements the Trike v2 methodology in Smalltalk☆16Nov 18, 2019Updated 6 years ago
- Configuration files for desktop environment☆24Feb 20, 2024Updated 2 years ago
- rMETAshell takes a shell command and an image, video or text file as input. It then injects the command into the file using metadata comm…☆29Jan 25, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Herramienta para detectar correos de phishing mediante análisis DKIM, SPF, y WHOIS☆32Aug 13, 2024Updated last year
- A Python extension for getting RandomX hashes.☆34Aug 15, 2024Updated last year
- A comprehensive automation script for penetration testing and reconnaissance.☆43Jul 29, 2024Updated last year
- ☆58Jan 4, 2024Updated 2 years ago
- [ARCHIVED] Early work on Benthic (Windows Kernel Rootkit).☆60Aug 15, 2025Updated 8 months ago
- Cisco Certified CyberOps Associate 200-201 Certification Guide, published by Packt☆29Jan 30, 2023Updated 3 years ago
- ☆27Jul 2, 2024Updated last year
- ☆28Sep 7, 2025Updated 7 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆259Apr 3, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Despliega un entorno de hacking profesional para Kali Linux ejecutando solo un script.☆107Aug 1, 2025Updated 8 months ago
- Minimalist notes for CEH-practical Cert.☆40Jul 19, 2022Updated 3 years ago
- Roadmap for cybersecurity beginners.☆30Jul 19, 2023Updated 2 years ago
- A terminal-based AI assistant for Linux sysadmins.☆37Mar 20, 2026Updated 3 weeks ago
- Core-Termux, Automates the setup of a web development environment in Termux, enabling developers to quickly start building web applicatio…☆185Apr 9, 2026Updated last week
- ☆66Feb 10, 2025Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆162Aug 28, 2025Updated 7 months ago
- ☆14Nov 8, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆15Aug 20, 2024Updated last year
- The purpose of this repository is to concentrate information, concepts and studies for the Certified in Cybersecurity (ISC²) exam.