Dockerfile for BeEF (the Browser Exploitation Framework) build
☆18Mar 8, 2015Updated 11 years ago
Alternatives and similar repositories for docker-beef
Users that are interested in docker-beef are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- REST API client to consume w3af☆17May 22, 2023Updated 2 years ago
- Sqlmap 批量操作☆11Jan 27, 2016Updated 10 years ago
- Searches for interesting cached DNS entries.☆56May 15, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- This cookbook installs Nexpose☆13Dec 15, 2023Updated 2 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- Terraform module for creating AWS CodeBuild Projects☆13Jul 1, 2021Updated 4 years ago
- Docker Image for Adobe Enterprise Manager☆12Jul 9, 2018Updated 7 years ago
- Using Machine Learning to detect irrelevant and inappropriate text, entirely in the browser.☆15Sep 27, 2022Updated 3 years ago
- ☆13May 17, 2016Updated 9 years ago
- examples for the Open Next Terraform module☆12Mar 22, 2025Updated last year
- Staging area for work on Integer Overflow Checker (IOC), a clang extension that provides compiler flags to insert check for various sourc…☆22Oct 31, 2012Updated 13 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ease-of-use extension for Web Application penetration testing☆18Jun 20, 2017Updated 8 years ago
- InSpec profile for compliance with AEM security checklist☆10May 7, 2024Updated last year
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Windows DPAPI laboratory☆12Mar 5, 2018Updated 8 years ago
- PII Detection and Blurring in Text, Images and Video using AWS AI Services☆12Jun 10, 2022Updated 3 years ago
- A simple interface to search and display CADA advices☆18May 15, 2025Updated 11 months ago
- ☆29Apr 28, 2017Updated 9 years ago
- Python script that can scan for xss vulnerabilities in websites, this script has many features like scanning for xss in headers using pro…☆14Oct 27, 2016Updated 9 years ago
- A fork of AFL for fuzzing Windows binaries☆23May 3, 2018Updated 8 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Building a Single-Page-App with Micronaut☆13Dec 9, 2022Updated 3 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Pickaxe is a fast and customizable security scan library which simplifies security testing for web applications like Adobe Experience Man…☆15Dec 5, 2023Updated 2 years ago
- Windows Offline Common Password Hash Checker☆29Aug 9, 2016Updated 9 years ago
- Workshop - Using AWS Lake Formation ML Transforms to cleanse the data in a data lake☆14Dec 22, 2019Updated 6 years ago
- PHP Vulnerability Hunter (fork)☆12May 8, 2015Updated 10 years ago
- Burp extension that checks for interesting and security headers☆44Aug 12, 2020Updated 5 years ago
- A powerful and flexible project for creating and customizing intelligent assistants, accessible to everyone through the user-friendly Lux…☆18Feb 13, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- Certificate Export Utility☆26May 1, 2020Updated 6 years ago
- Sonicwall Firewall decoder, username, password hash extract. Formats into John the Ripper☆25Jul 4, 2014Updated 11 years ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- Security scanner tool for Plone CMS.☆19May 14, 2012Updated 13 years ago
- ☆10Jun 1, 2014Updated 11 years ago
- XSS exploitation tool - access victims through HTTP proxy☆161Mar 19, 2014Updated 12 years ago