PiRogueToolSuite / pirogue-imagesLinks
Create and publish PiRogue images
☆14Updated 3 months ago
Alternatives and similar repositories for pirogue-images
Users that are interested in pirogue-images are comparing it to the libraries listed below
Sorting:
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆47Updated 5 months ago
- A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.☆158Updated 3 weeks ago
- Cisco IOS Security Inspector☆34Updated 2 weeks ago
- ☆54Updated 7 months ago
- Script en bash de Nmap que se puede personalizar para ajustar el escaneo a tus necesidades.☆11Updated last year
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆61Updated 10 months ago
- Capture screenshots of onion services on an onion service.☆71Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆51Updated last month
- NetProbe: Network Probe☆163Updated 10 months ago
- Signal Tracking & Detection☆28Updated this week
- Bluetooth Security Assessment Methodology☆133Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- OSINT username checker☆41Updated 2 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated this week
- Small scripts to help with Linux forensics and incident response.☆51Updated 2 months ago
- Crack passwords with Hashcat using a Discord Bot.☆26Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated 11 months ago
- A rigorous IoT scanner based on Shodan.io☆59Updated 7 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆31Updated 5 months ago
- Collection of my Security Blueprints & Guides☆51Updated last month
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆104Updated 2 years ago
- Multi-services Honeypot Solution with AI support and dynamic HTTP template☆139Updated this week
- OSINT web scraper for SatNow to extract details about satellite components and subsystem specs for in-depth reconnaissance 🛸☆52Updated 9 months ago
- Tor onion address lookup☆51Updated last week
- ☆50Updated 2 years ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆68Updated 2 months ago