Thy-GoD / Thy_GoD_Docker
Personal Docker Image with Pentest tools and zsh plugins, inspired by Nutek-Terminal and runs on a base Kali Image.
☆11Updated last year
Alternatives and similar repositories for Thy_GoD_Docker:
Users that are interested in Thy_GoD_Docker are comparing it to the libraries listed below
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆64Updated 2 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 9 months ago
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆87Updated last month
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆154Updated last week
- My Linux Privilege Escalation notes which is part of my OSCP Preperation☆73Updated 2 years ago
- ☆78Updated 2 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆107Updated 4 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 9 months ago
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆167Updated last year
- Hacking Methodology, Cheatsheats, Conceptual-Breakdowns☆71Updated this week
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆19Updated 2 weeks ago
- Play Hack The Box directly on your system.☆47Updated last week
- Pentest/Red Team: Resources, repos and scripts.☆68Updated last week
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆148Updated 5 months ago
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆60Updated 4 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 9 months ago
- OWASP based Web Application Security Testing Checklist☆71Updated 9 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆96Updated 2 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated 9 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆63Updated last year
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆73Updated last year
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.☆66Updated 7 months ago
- Red Teaming tools and techniques☆52Updated 2 years ago
- A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.☆83Updated 3 weeks ago
- ☆43Updated 9 months ago
- Aliases and scripts to make common tasks easier.☆136Updated 7 months ago
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆147Updated 11 months ago
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆72Updated last year
- ☆53Updated last month
- A couple of different scripts, made to automate attacks against NoSQL databases.☆63Updated last year