Automatically deploy a Cuckoo sandbox
☆23Jun 6, 2023Updated 2 years ago
Alternatives and similar repositories for AutoDeployCuckoo
Users that are interested in AutoDeployCuckoo are comparing it to the libraries listed below
Sorting:
- ☆10May 15, 2020Updated 5 years ago
- A collection of awesome penetration testing resources☆13Jan 13, 2019Updated 7 years ago
- ☆13Jan 25, 2020Updated 6 years ago
- A tool for Subdomain takeovers detection☆26Oct 21, 2022Updated 3 years ago
- Some useful FRIDA scripts for security tests☆42Feb 22, 2023Updated 3 years ago
- Buy Book Online Project uses MVC2 Design Pattern☆17Oct 8, 2022Updated 3 years ago
- ☆34Mar 29, 2021Updated 4 years ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- A command-line tool for Cross-Site WebSocket Hijacking☆44Oct 18, 2023Updated 2 years ago
- Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google sear…☆19Aug 10, 2025Updated 6 months ago
- Python3 Module to interact with the SonicWall® SonicOS API☆14Jan 6, 2025Updated last year
- Exploit for CVE-2018-7600.. called drupalgeddon2,☆11Apr 19, 2018Updated 7 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- Make better use of the embedded browser that comes by default with Burp☆43Jan 1, 2024Updated 2 years ago
- GCNotify is an Outlook addin for quickly forwarding mail as attachment to a pre-defined e-mail address.☆12Jan 17, 2023Updated 3 years ago
- My simple tool to test DHCP servers, written with scapy module. Menu has been made with 'curses'.☆10Sep 28, 2020Updated 5 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- Shellcode loader with evasion capabilities written in Nim☆14Jan 25, 2025Updated last year
- Various scripts & tools☆12Apr 22, 2024Updated last year
- Tutorials and Things to Do while Hunting Vulnerability.☆10May 15, 2025Updated 9 months ago
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆16Feb 17, 2022Updated 4 years ago
- u-blox Linux Kernel repository☆12Jan 29, 2016Updated 10 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Attempt to grind out the 100 offsec project challenges, conceptualized by github user, @kurogai, at his repo [https://github.com/kurogai/…☆15Jul 16, 2024Updated last year
- 🧿Join your two exe files☆11Jul 14, 2020Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆14Aug 23, 2022Updated 3 years ago
- Outil de triage automatisé de différents types de collectes d'artefacts.☆17Dec 8, 2025Updated 2 months ago
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- Sniff xsi-events from/to XSI-Events in Broadsoft BW☆10Jun 18, 2014Updated 11 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆13Aug 7, 2016Updated 9 years ago
- Scrippy is a browser extension that holds sql statements (think clip board) to aid devlopers in the testing of websites for basic code in…☆12Aug 21, 2022Updated 3 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Mar 23, 2025Updated 11 months ago
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆12Feb 19, 2022Updated 4 years ago
- ☆11Oct 6, 2022Updated 3 years ago