Raizo62 / Loki_on_Kali
Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.
☆38Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for Loki_on_Kali
- Customized Kali Linux - Ansible playbook☆64Updated 3 years ago
- scripts to setup environments for red/blue teams.☆16Updated 11 months ago
- Wireless Pentesting Device☆20Updated 4 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- ADDS (Active Directory Domain Services)☆25Updated last year
- Custom pentesting tools☆24Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆96Updated 4 years ago
- WordPress version identification and vulnerability finder.☆28Updated 2 years ago
- Simple netcat-like binary for Windows, created with python and py2exe.☆13Updated 5 years ago
- Modular framework to exploit UPS devices☆61Updated last year
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆67Updated 9 months ago
- A guide explaining how to use Gophish☆36Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- DNSrecon tool with GUI for Kali Linux☆56Updated last year
- A little cheatsheet for NetExec☆16Updated 6 months ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- Commands used in Windows penetration tests☆49Updated 2 years ago
- Extract credentials and other useful info from network captures☆63Updated 2 years ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆60Updated 6 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆100Updated 5 years ago
- Files for my Python3 Create Your Own Tool Series☆23Updated 2 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 3 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆23Updated 6 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆42Updated last month
- A simple program to query nmap xml files in the terminal.☆26Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated this week
- ☆51Updated 3 years ago
- Create visualization from Shodan query☆72Updated 3 years ago