RAJANAGORI / Nightingale
Nightingale Docker for Pentesters is a comprehensive Dockerized environment tailored for penetration testing and vulnerability assessment. It comes preconfigured with all essential tools and utilities required for efficient Vulnerability Assessment and Penetration Testing (VAPT), streamlining the setup process for security professionals.
☆271Updated this week
Alternatives and similar repositories for Nightingale:
Users that are interested in Nightingale are comparing it to the libraries listed below
- Red Team Guides☆138Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆154Updated last week
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Updated last year
- #cheat sheet for OSWP☆85Updated 4 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated 10 months ago
- Try to find the origin IP of a webapp protected by Cloudflare.☆344Updated 8 months ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆224Updated 7 months ago
- A Powerful Sensor Tool to discover login panels, and POST Form SQLi Scanning☆486Updated last year
- Shodan Dorks 2023☆232Updated 3 months ago
- Docker - Ubuntu with a bunch of PenTesting tools and wordlists☆251Updated 2 months ago
- WARF is a Web Application Reconnaissance Framework that helps to gather information about the target.☆192Updated 2 years ago
- Nodesub is a command-line tool for finding subdomains in bug bounty programs☆148Updated 8 months ago
- Arsenal is a Simple shell script (Bash) used to install tools and requirements for Bug Bounty☆275Updated 10 months ago
- Chista | Open Threat Intelligence Framework☆58Updated 11 months ago
- ☆137Updated 3 years ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆357Updated this week
- Advanced external automation on bug bounty programs by running the best set of tools to perform scanning and finding out vulnerabilities.☆100Updated 2 years ago
- ☆317Updated 3 months ago
- ☆76Updated 3 years ago
- AWS, Azure, Alibaba and Google bucket scanner☆146Updated last year
- Bug Bounty Vps Setup Tools☆105Updated 2 weeks ago
- Crtsh Subdomain Enumeration | This bash script makes it easy to quickly save and parse the output from https://crt.sh website.☆217Updated 7 months ago
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆347Updated last year
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆76Updated 2 years ago
- Nuclei templates for honeypots detection.☆196Updated last year
- AutoRecon-XSS is a script designed for automated reconnaissance of XSS vulnerabilities. It crawls the target URL or alive domains, extrac…☆133Updated last year
- Self-hosted passive subdomain continous monitoring tool.☆161Updated last year
- Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not☆283Updated 7 months ago
- A RedTeam Toolkit☆395Updated 3 weeks ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆35Updated 11 months ago