Bash script to manage insecure web apps using docker and hosts aliases for pentest practice
☆37Jan 3, 2026Updated last month
Alternatives and similar repositories for BreakingLab
Users that are interested in BreakingLab are comparing it to the libraries listed below
Sorting:
- ☆25Jan 11, 2023Updated 3 years ago
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- Tool for WPA Enterprise hacking☆17Feb 24, 2024Updated 2 years ago
- Subdomains scanner Spider☆13Feb 29, 2024Updated 2 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆19Apr 6, 2024Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- Integrated keylogger with telegram☆18Oct 29, 2024Updated last year
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated last year
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆82May 27, 2025Updated 9 months ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Exploit to bypass Xiongmai surveillance camera authentication mechanism☆32Oct 7, 2025Updated 4 months ago
- ☆33Dec 10, 2024Updated last year
- En este repositorio podrás encontrar los ejercicios del canal @aprendePython3 de Telegram así como sus soluciones.☆10May 20, 2020Updated 5 years ago
- ☆38Jan 6, 2025Updated last year
- A command-line utility for performing reverse DNS lookups☆73Aug 10, 2023Updated 2 years ago
- CVE-2024-28955 Exploitation PoC☆34Jul 1, 2024Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Python script to clean temp files and older versions from Snap for 42 students.☆11Jan 10, 2025Updated last year
- shared samples from #dailyphish and/or #apt tweets☆41Sep 3, 2025Updated 5 months ago
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- PowerShell para Administradores☆11Feb 18, 2020Updated 6 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Unauthorized Docker Exploitation Tool☆37Dec 24, 2023Updated 2 years ago
- A semi print-in-place hand for human-like manipulation, designed to be built by anyone.☆17Jan 5, 2026Updated last month
- Subdosec is a fast, accurate subdomain takeover scanner with no false positives. It also offers a database of sites vulnerable to subdoma…☆58Updated this week
- In accordance with survey reports, the growth of online business worldwide is significantly faster and higher in comparison with traditio…☆13Jul 30, 2023Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆42Jan 30, 2026Updated last month
- Tool for bypassing logins vulnerable against SQL injection☆46Apr 3, 2024Updated last year
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated last month
- Cloud Security Automation☆14Dec 2, 2020Updated 5 years ago
- A comprehensive automation script for penetration testing and reconnaissance.☆43Jul 29, 2024Updated last year
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- Tool for advanced mining for content on Github☆28Nov 11, 2025Updated 3 months ago
- ☆13Apr 2, 2023Updated 2 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 20, 2026Updated last week
- create a "simulated internet" cyber range environment☆19Jan 28, 2026Updated last month