Raizo62 / Loki_on_Kali
Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.
☆38Updated 8 months ago
Alternatives and similar repositories for Loki_on_Kali:
Users that are interested in Loki_on_Kali are comparing it to the libraries listed below
- Collection of extra pentest tools for Kali Linux☆103Updated last year
- Customized Kali Linux - Ansible playbook☆63Updated 4 years ago
- DNSrecon tool with GUI for Kali Linux☆57Updated 2 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 6 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆88Updated 11 months ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆112Updated 2 years ago
- ☆51Updated 4 years ago
- Airodump-ng WiFi Scan Visualizer☆57Updated 7 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated last month
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago
- A library that scrapes Linkedin for user data☆23Updated 3 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆101Updated 5 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆120Updated 2 years ago
- A guide explaining how to use Gophish☆38Updated 2 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆68Updated 4 months ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆52Updated 2 years ago
- A WLAN red team framework.☆151Updated 5 months ago
- Automated 802.1x Bypass☆84Updated 5 years ago
- Routopsy - Hacking Routers with Routers☆172Updated 3 years ago
- Fast offline auditing of Active Directory passwords using Python.☆163Updated 7 months ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆11Updated 5 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆128Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆63Updated 2 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities