Raizo62 / Loki_on_KaliView external linksLinks
Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.
☆44Nov 2, 2025Updated 3 months ago
Alternatives and similar repositories for Loki_on_Kali
Users that are interested in Loki_on_Kali are comparing it to the libraries listed below
Sorting:
- Automated Wifi Hacking Tool☆10Mar 16, 2021Updated 4 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- An assessment tool to interact with Velocio PLCs☆13Sep 24, 2021Updated 4 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Powerful windows malware with many features☆17Mar 10, 2024Updated last year
- Decryption utility for PGP Whole Disk Encryption☆20Aug 27, 2021Updated 4 years ago
- Fluxion is the future of MITM WPA attacks Fluxion is a security auditing and social-engineering research tool. It is a remake of linset …☆16Oct 1, 2020Updated 5 years ago
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Mar 3, 2021Updated 4 years ago
- Burp Suite extension to help make Graphql request more readable☆33Dec 7, 2017Updated 8 years ago
- ☆11Updated this week
- bash script for automating subdomain enumeration process either passive or active☆29Dec 17, 2024Updated last year
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆35Jan 21, 2026Updated 3 weeks ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 4 months ago
- A security professional's swiss army knife for interacting with raw serial devices☆30Apr 20, 2024Updated last year
- OSINT tool for username, email and domains☆31May 19, 2024Updated last year
- DareDevil is a Cloner Tool. That Help You to Clone Different Varieties of Latest, Updated, Working Tools In One Click..☆10Nov 25, 2022Updated 3 years ago
- .NET deserialization hunter☆82Jul 21, 2024Updated last year
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- Advanced XPath Injection Tool☆33Jan 29, 2026Updated 2 weeks ago
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆37Apr 2, 2024Updated last year
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- ☆25Jan 19, 2026Updated 3 weeks ago
- ☆10Sep 24, 2021Updated 4 years ago
- 📦 Simple yet powerful cross-platform dotfiles. Easily setup the intuitive Ubuntu Desktop, Linux server (Ubuntu/Fedora/Arch Linux), macOS…☆17Updated this week
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆35Nov 24, 2019Updated 6 years ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆40Nov 21, 2021Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- ☆12Jul 4, 2024Updated last year
- Kismet website generation & documentation data☆12Feb 7, 2026Updated last week
- ☆13Jul 29, 2024Updated last year
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- A companion Cypress plugin for `cy-grep` that allows user to run specific test(s) in `open` mode.☆12Jan 23, 2026Updated 3 weeks ago
- ☆11Sep 19, 2022Updated 3 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- ☆10Mar 11, 2024Updated last year
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- ☆43Nov 21, 2024Updated last year