A Highly Accessible and Automated Virtualization Platform for Security Education
☆197Mar 17, 2026Updated 3 weeks ago
Alternatives and similar repositories for haaukins
Users that are interested in haaukins are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25May 9, 2021Updated 4 years ago
- ☆14Aug 27, 2025Updated 7 months ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- Automate Metasploit scanning and exploitation☆117Jul 20, 2025Updated 8 months ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 8 years ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- Linux Incident Response☆90Sep 22, 2019Updated 6 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- collect logs and alerts from 37 honeypots and send it to backed (eg peba, geba), hpfeeds, influxdb or jSON file.☆17Aug 15, 2025Updated 7 months ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- The Open-Source AWS Cyber Range☆494Aug 16, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Low-interaction VNC honeypot with a static challenge.☆23Aug 10, 2019Updated 6 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 5 months ago
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 7 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆143Jan 25, 2022Updated 4 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆142Apr 29, 2019Updated 6 years ago
- A backdoor with a multitude of features.☆294Oct 3, 2024Updated last year
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆83Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Jun 26, 2021Updated 4 years ago
- ☆128May 22, 2023Updated 2 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Collect information about email addresses from Pastebin☆39Jun 1, 2021Updated 4 years ago
- Buffruneio provides rune-based buffered input☆30Nov 12, 2020Updated 5 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- GodOfWar - Malicious Java WAR builder with built-in payloads☆126Apr 16, 2019Updated 6 years ago
- Interactive sip toolkit for packet manipulations, sniffing, man in the middle attacks, fuzzing, simulating of dos attacks.☆78Dec 17, 2015Updated 10 years ago
- Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.☆262Apr 7, 2023Updated 3 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- create cypher create statements for neo4j out of netstat files from multiple machines☆41Dec 28, 2020Updated 5 years ago