aaaguirrep / offensive-docker
Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
☆743Updated 3 years ago
Alternatives and similar repositories for offensive-docker:
Users that are interested in offensive-docker are comparing it to the libraries listed below
- Automatic Enumeration Tool based in Open Source tools☆918Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,768Updated 10 months ago
- A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.☆1,124Updated last year
- fully automated pentesting tool☆509Updated 2 years ago
- My own OSCP guide☆822Updated 2 years ago
- A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus bu…☆561Updated 3 years ago
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,113Updated 9 months ago
- A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.☆896Updated last year
- MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilitie…☆940Updated 8 months ago
- Automated Red Team Infrastructure deployement using Docker☆1,234Updated 2 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,775Updated 5 months ago
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,129Updated 7 months ago
- JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)☆802Updated 2 years ago
- Writeups for the machines on ethical hacking site Hack the Box☆248Updated 3 years ago
- ☆1,669Updated last week
- Notes Taken for HTB Machines & InfoSec Community.☆364Updated 2 years ago
- 🎯 RFI/LFI Payload List☆570Updated 8 months ago
- PwnXSS: Vulnerability (XSS) scanner exploit☆768Updated 2 years ago
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.☆440Updated 2 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆620Updated 3 years ago
- Awesome cloud enumerator☆991Updated 3 weeks ago
- Rockyou for web fuzzing☆2,746Updated last month
- ☆1,094Updated 3 years ago
- Payload Arsenal for Pentration Tester and Bug Bounty Hunters☆898Updated last year
- Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.☆1,235Updated 10 months ago
- An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and…☆783Updated last year
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,151Updated 2 years ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,742Updated 9 months ago
- Notes about attacking Jenkins servers☆2,038Updated 8 months ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆1,336Updated 2 years ago