aaaguirrep / offensive-docker-vpsLinks
Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.
☆81Updated 5 years ago
Alternatives and similar repositories for offensive-docker-vps
Users that are interested in offensive-docker-vps are comparing it to the libraries listed below
Sorting:
- Collaborative pentest tool with highly customizable tools☆73Updated 4 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆146Updated 2 years ago
- Offensive Security recon tool☆91Updated 4 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 5 years ago
- Notes from OSCP, CTF, security adventures, etc...☆64Updated 2 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆119Updated last year
- Cheat-Sheet of tools for penetration testing☆54Updated 2 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Information-Gathering Shell Script☆29Updated 5 years ago
- Empower your enumeration during OSCP☆36Updated 7 years ago
- ☆19Updated 4 years ago
- Enumerate a target Based off of Nmap Results☆76Updated 2 years ago
- Unique wordlist generator of unique wordlists.☆41Updated 2 years ago
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆40Updated 5 years ago
- Automatically run and save ffuf scans for multiple IPs☆81Updated last year
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Updated 4 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Updated 10 months ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Updated 5 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆135Updated last week
- OSCP guide and Red Team assessment Guide☆37Updated 5 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- ☆25Updated 5 years ago
- An advanced graphical search engine for Exploit-DB☆120Updated last year
- A WLAN red team framework.☆155Updated this week
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated last year