Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
☆767Mar 11, 2022Updated 4 years ago
Alternatives and similar repositories for offensive-docker
Users that are interested in offensive-docker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆81Jan 15, 2021Updated 5 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Sep 18, 2020Updated 5 years ago
- A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.☆1,177Aug 16, 2023Updated 2 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,366Sep 30, 2024Updated last year
- A Linux enumeration script for Hack The Box☆191Nov 27, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Modern Orchestration Engine for Security☆6,193Apr 6, 2026Updated last week
- Automated Red Team Infrastructure deployement using Docker☆1,263Aug 24, 2022Updated 3 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,794Apr 26, 2024Updated last year
- ScanT3r - Module based Bug Bounty Automation Tool ( use Lotus instead github.com/bugBlocker/lotus )☆685Apr 5, 2026Updated last week
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,299Aug 7, 2024Updated last year
- Awesome cloud enumerator☆1,113Mar 9, 2025Updated last year
- Zero Infrastructure Password Cracking☆417Aug 22, 2024Updated last year
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆213Jun 23, 2020Updated 5 years ago
- The Shadow Attack Framework☆1,117Sep 4, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Bramble is a hacking Open source suite.☆84Jan 21, 2020Updated 6 years ago
- 🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.☆4,929Updated this week
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,904Oct 29, 2025Updated 5 months ago
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,534Jun 4, 2025Updated 10 months ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,551Mar 21, 2026Updated 3 weeks ago
- Nightingale Docker for Pentesters is a comprehensive Dockerized environment tailored for penetration testing and vulnerability assessment…☆303Apr 6, 2026Updated last week
- Attack Surface Management Platform☆9,650Feb 15, 2026Updated last month
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,301Mar 13, 2026Updated last month
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A WLAN red team framework.☆160Feb 9, 2026Updated 2 months ago
- ☆414Mar 30, 2023Updated 3 years ago
- A collection of custom security tools for quick needs.☆3,287May 1, 2023Updated 2 years ago
- The Swiss Army knife for automated Web Application Testing☆2,328May 8, 2024Updated last year
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆4,571Mar 20, 2026Updated 3 weeks ago
- All In One Web Recon☆2,685Apr 30, 2025Updated 11 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,416Mar 25, 2026Updated 2 weeks ago
- File upload vulnerability scanner and exploitation tool.☆3,310May 8, 2025Updated 11 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,671Jan 5, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Credentials gathering tool automating remote procdump and parse of lsass process.☆783Jun 20, 2020Updated 5 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆817Oct 27, 2023Updated 2 years ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆649Nov 21, 2019Updated 6 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Jul 24, 2020Updated 5 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,225Sep 29, 2025Updated 6 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,709Jul 6, 2025Updated 9 months ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Jul 6, 2024Updated last year