aau-network-security / haaukinsView external linksLinks
A Highly Accessible and Automated Virtualization Platform for Security Education
☆195Jan 22, 2026Updated 3 weeks ago
Alternatives and similar repositories for haaukins
Users that are interested in haaukins are comparing it to the libraries listed below
Sorting:
- ☆25May 9, 2021Updated 4 years ago
- ☆14Aug 27, 2025Updated 5 months ago
- Automate Metasploit scanning and exploitation☆117Jul 20, 2025Updated 6 months ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Mar 12, 2020Updated 5 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- Linux Incident Response☆90Sep 22, 2019Updated 6 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Apr 29, 2019Updated 6 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 3 months ago
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆83Updated this week
- GodOfWar - Malicious Java WAR builder with built-in payloads☆126Apr 16, 2019Updated 6 years ago
- The Open-Source AWS Cyber Range☆491Aug 16, 2020Updated 5 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Jun 26, 2021Updated 4 years ago
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Collect information about email addresses from Pastebin☆39Jun 1, 2021Updated 4 years ago
- Arduino Rubber Ducky Framework☆107Apr 29, 2019Updated 6 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆123Apr 13, 2019Updated 6 years ago
- A backdoor with a multitude of features.☆292Oct 3, 2024Updated last year
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Nov 21, 2018Updated 7 years ago
- PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection. Also you …☆45May 6, 2019Updated 6 years ago
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Sep 6, 2017Updated 8 years ago
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 6 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Automatic analysis of SWF files based on some heuristics. Extensible via plugins.☆119Jun 19, 2019Updated 6 years ago
- Open source all-in-one CLI tool to semi-automate pentesting.☆165May 21, 2020Updated 5 years ago
- Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.☆262Apr 7, 2023Updated 2 years ago
- Interactive sip toolkit for packet manipulations, sniffing, man in the middle attacks, fuzzing, simulating of dos attacks.☆78Dec 17, 2015Updated 10 years ago
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year