Thy-GoD / Thy_GoD_DockerLinks
Personal Docker Image with Pentest tools and zsh plugins, inspired by Nutek-Terminal and runs on a base Kali Image.
☆11Updated last year
Alternatives and similar repositories for Thy_GoD_Docker
Users that are interested in Thy_GoD_Docker are comparing it to the libraries listed below
Sorting:
- ☆44Updated last year
- This repository contains the files that provide the upload functionality in the IIS Server☆33Updated 4 years ago
- Play Hack The Box directly on your system.☆51Updated 2 months ago
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆92Updated last month
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆68Updated last month
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Updated last year
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆279Updated 8 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆49Updated 4 years ago
- Scripts, POCs & bullshit☆30Updated 5 months ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆152Updated last year
- OWASP based Web Application Security Testing Checklist☆79Updated last year
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your car…☆33Updated 2 weeks ago
- A Personal Collection of Infosec Dorks☆203Updated 2 years ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆81Updated 8 months ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆110Updated 10 months ago
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆87Updated 3 weeks ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆78Updated last year
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆97Updated 10 months ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆239Updated last year
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆159Updated 11 months ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆26Updated 6 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Updated 2 months ago
- Some Dorking resources☆38Updated last year
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆167Updated last year
- Here are the most interesting Shodan dorks (according to me)☆96Updated last year
- List of GREP modifications and alternatives for a variety of purposes☆132Updated 9 months ago
- IoT Camera Reconnaissance and Live Viewer☆164Updated last year
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆179Updated last year
- A vast collection of security tools and resources curated by the community.☆207Updated 4 months ago
- Crawls URL to get a better image of what is tied to a website.☆33Updated 2 years ago