aaaguirrep / offensive-docker-custom
Dockerfile with advanced configurations for Offensive Docker.
☆13Updated 4 years ago
Alternatives and similar repositories for offensive-docker-custom:
Users that are interested in offensive-docker-custom are comparing it to the libraries listed below
- Web application pentesting recon☆23Updated 4 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Updated 4 years ago
- Script Recon Bug Bounty☆10Updated 3 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Various scripts & tools☆12Updated last year
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- This repository contains all the XSS cheatsheet data to allow contributions from the community.☆10Updated 5 years ago
- Command List for Hashcat and default keyspaces.☆16Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Updated 4 years ago
- Small python or powershell script to look for potential subdomain takeover vulnerabilities via vulnerable Alias.☆8Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆12Updated 5 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- buffer overflow examples☆22Updated 7 years ago
- Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago
- Automated Recon Framework☆24Updated 4 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆19Updated 2 years ago
- ☆29Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 9 months ago
- XSS payloads for exploiting Markdown syntax☆7Updated 4 years ago
- King of Bug Bounty Tips Simple Tool☆13Updated 3 years ago
- subdog is a subdomain enumeration tools, this tool collect number of different sources to create a list of root subdomains☆17Updated 2 months ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago