RAJANAGORI / Nightingale
Nightingale Docker for Pentesters is a comprehensive Dockerized environment tailored for penetration testing and vulnerability assessment. It comes preconfigured with all essential tools and utilities required for efficient Vulnerability Assessment and Penetration Testing (VAPT), streamlining the setup process for security professionals.
☆270Updated this week
Alternatives and similar repositories for Nightingale:
Users that are interested in Nightingale are comparing it to the libraries listed below
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆150Updated last year
- Never forget where you inject.☆228Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆153Updated this week
- Pentesting automation platform that combines hacking tools to complete assessments☆461Updated 2 months ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆350Updated last month
- ☆137Updated 3 years ago
- Red Team Guides☆135Updated last year
- Nodesub is a command-line tool for finding subdomains in bug bounty programs☆148Updated 7 months ago
- Bug Bounty Vps Setup Tools☆104Updated 4 months ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆292Updated last year
- #cheat sheet for OSWP☆84Updated 4 years ago
- Advanced external automation on bug bounty programs by running the best set of tools to perform scanning and finding out vulnerabilities.☆98Updated 2 years ago
- smartrecon is a powerful shell script to automate the recon and finding common vulnerabilities for bug hunter☆152Updated 11 months ago
- Arsenal is a Simple shell script (Bash) used to install tools and requirements for Bug Bounty☆273Updated 9 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 7 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated 9 months ago
- Repository with some necessary information for you to create your PenTest consultancy☆95Updated 2 months ago
- Simple Google Dorks search tool☆271Updated 11 months ago
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆146Updated 3 months ago
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆250Updated 2 years ago
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆346Updated last year
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆165Updated last year
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆34Updated 9 months ago
- My useful files for penetration tests, security assessments, bug bounty and other security related stuff☆157Updated this week
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 7 months ago
- ☆76Updated 3 years ago
- Chista | Open Threat Intelligence Framework☆57Updated 9 months ago
- ☆218Updated 2 years ago
- Opensource assets and vulnerability scanning tool☆162Updated last month
- Here Are Some Bug Bounty Resource From Twitter☆88Updated last month