Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.
☆45Nov 2, 2025Updated 4 months ago
Alternatives and similar repositories for Loki_on_Kali
Users that are interested in Loki_on_Kali are comparing it to the libraries listed below
Sorting:
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- An assessment tool to interact with Velocio PLCs☆13Sep 24, 2021Updated 4 years ago
- Powerful windows malware with many features☆17Mar 10, 2024Updated last year
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Aug 27, 2021Updated 4 years ago
- Privilege escalation using dmidecode☆21May 6, 2019Updated 6 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Mar 3, 2021Updated 5 years ago
- ctui is a library similar to Python's cmd, but with curses-like user interface☆32Apr 20, 2024Updated last year
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆35Feb 27, 2026Updated last week
- bash script for automating subdomain enumeration process either passive or active☆29Feb 24, 2026Updated last week
- OSINT tool for username, email and domains☆31May 19, 2024Updated last year
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- DareDevil is a Cloner Tool. That Help You to Clone Different Varieties of Latest, Updated, Working Tools In One Click..☆10Nov 25, 2022Updated 3 years ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- .NET deserialization hunter☆86Jul 21, 2024Updated last year
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆37Feb 15, 2026Updated 3 weeks ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆15Dec 18, 2021Updated 4 years ago
- ForgeRock Identity Cloud Debug Tools☆11Jan 27, 2023Updated 3 years ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- ☆38Jul 3, 2020Updated 5 years ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆40Nov 21, 2021Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- 📦 Simple yet powerful cross-platform dotfiles. Easily setup the intuitive Ubuntu Desktop, Linux server (Ubuntu/Fedora/Arch Linux), macOS…☆19Feb 28, 2026Updated last week
- BambooHR Slack bot publishes company holidays, work anniversaries, first days, birthdays, and who is out each weekday.☆10Mar 4, 2023Updated 3 years ago
- ☆12Jul 4, 2024Updated last year
- ☆10Mar 11, 2024Updated last year
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- ☆13Jul 29, 2024Updated last year
- ☆14Feb 19, 2023Updated 3 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- ☆11Sep 19, 2022Updated 3 years ago
- ☆38Feb 27, 2026Updated last week
- black Ip lists, dorks-collection☆16Mar 1, 2026Updated last week
- ☆28Jan 19, 2026Updated last month
- Weaponize Your Burp is a repository for automation your Bug Bounty Hunting mindset in Burp Suite☆80Jan 13, 2023Updated 3 years ago
- ☆43Nov 21, 2024Updated last year
- OWASP Smart Contract Securty Verification Standard☆17Aug 20, 2025Updated 6 months ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago