Thy-GoD / Thy_GoD_DockerLinks
Personal Docker Image with Pentest tools and zsh plugins, inspired by Nutek-Terminal and runs on a base Kali Image.
☆11Updated last year
Alternatives and similar repositories for Thy_GoD_Docker
Users that are interested in Thy_GoD_Docker are comparing it to the libraries listed below
Sorting:
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆147Updated 11 months ago
- A vast collection of security tools and resources curated by the community.☆204Updated 3 months ago
- Extract Windows Wi-Fi Passwords to Remote URL☆269Updated 3 years ago
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆67Updated 2 weeks ago
- ☆44Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆162Updated last month
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆92Updated this week
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆276Updated 6 months ago
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆155Updated 9 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆254Updated 5 months ago
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆166Updated last year
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆350Updated last year
- Play Hack The Box directly on your system.☆50Updated last month
- A Personal Collection of Infosec Dorks☆202Updated 2 years ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated last year
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆238Updated last year
- OWASP based Web Application Security Testing Checklist☆78Updated last year
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- Simple Google Dorks search tool☆303Updated 3 weeks ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your car…☆33Updated this week
- This is my penetration testing cheatsheet☆134Updated 3 weeks ago
- Hacking Methodology, Cheatsheats, Conceptual-Breakdowns☆75Updated this week
- An in-depth guide to help people who are new to penetration testing or red teaming and are looking to gain an overview of the penetration…☆143Updated 8 months ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆76Updated 7 months ago
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆74Updated 2 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆108Updated 9 months ago
- Some Dorking resources☆37Updated last year
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆22Updated 2 years ago
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆83Updated this week