aaaguirrep / offensive-docker-custom
Dockerfile with advanced configurations for Offensive Docker.
☆13Updated 4 years ago
Alternatives and similar repositories for offensive-docker-custom:
Users that are interested in offensive-docker-custom are comparing it to the libraries listed below
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Web application pentesting recon☆23Updated 4 years ago
- This repository contains all the XSS cheatsheet data to allow contributions from the community.☆10Updated 5 years ago
- Extract endpoints from specific Git repository for fuzzing☆22Updated 4 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆14Updated 2 months ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆19Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Write-Ups for TryHackMe☆23Updated 3 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Bash script to generate reverse shell payloads☆19Updated last year
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Rockyou for web fuzzing☆15Updated 3 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- Principles and commands for penetration testing and OSCP☆9Updated 4 years ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆17Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 7 months ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Updated 4 years ago
- Web crawler and downloader based on GNU Wget.☆12Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Infosec writeups, Bug bounty tips, Tweets & Many more that are picked from around the world || I personally use it || I try to mend it da…☆15Updated 2 years ago
- King of Bug Bounty Tips Simple Tool☆12Updated 3 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆18Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated this week