Raizo62 / Loki_on_KaliLinks
Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.
☆38Updated 10 months ago
Alternatives and similar repositories for Loki_on_Kali
Users that are interested in Loki_on_Kali are comparing it to the libraries listed below
Sorting:
- Collection of extra pentest tools for Kali Linux☆105Updated 2 years ago
- ☆27Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- A WLAN red team framework.☆155Updated 8 months ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated 11 months ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 2 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Customized Kali Linux - Ansible playbook☆63Updated 4 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆35Updated 2 months ago
- Extract credentials and other useful info from network captures☆69Updated 2 years ago
- ☆42Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Wireless Pentesting Device☆21Updated 4 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆103Updated 6 years ago
- Automation scripts in preparation for PWK/OSCP labs☆17Updated 3 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 10 months ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆81Updated 4 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆28Updated last year
- Commands used in Windows penetration tests☆53Updated 3 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- Python script that runs Masscan against an IP to collect open ports, feed those ports to Nmap, which finds service versions and runs defa…☆23Updated 3 years ago
- ☆150Updated last year