A Highly Accessible and Automated Virtualization Platform for Security Education
☆197Mar 17, 2026Updated last month
Alternatives and similar repositories for haaukins
Users that are interested in haaukins are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25May 9, 2021Updated 4 years ago
- ☆14Aug 27, 2025Updated 8 months ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- Automate Metasploit scanning and exploitation☆117Jul 20, 2025Updated 9 months ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Automate SSH communication with firewalls, switches, etc.☆28Mar 29, 2018Updated 8 years ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 4 years ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- Linux Incident Response☆90Apr 22, 2026Updated last week
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- collect logs and alerts from 37 honeypots and send it to backed (eg peba, geba), hpfeeds, influxdb or jSON file.☆17Aug 15, 2025Updated 8 months ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- The Open-Source AWS Cyber Range☆494Aug 16, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 6 months ago
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 7 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆143Jan 25, 2022Updated 4 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆142Apr 29, 2019Updated 7 years ago
- A backdoor with a multitude of features.☆294Oct 3, 2024Updated last year
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆83Updated this week
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Jun 26, 2021Updated 4 years ago
- ☆128May 22, 2023Updated 2 years ago
- Collect information about email addresses from Pastebin☆39Jun 1, 2021Updated 4 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Buffruneio provides rune-based buffered input☆30Nov 12, 2020Updated 5 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆90May 8, 2018Updated 7 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆126Apr 16, 2019Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Interactive sip toolkit for packet manipulations, sniffing, man in the middle attacks, fuzzing, simulating of dos attacks.☆78Dec 17, 2015Updated 10 years ago
- Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.☆262Apr 7, 2023Updated 3 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- create cypher create statements for neo4j out of netstat files from multiple machines☆41Dec 28, 2020Updated 5 years ago
- 🎙️ Retroactively fix your Zoom recordings with a click! Won 1st Place, Best Use of GCP, Best Start-Up, and Best Entrepreneurial Hack at …☆10Feb 10, 2022Updated 4 years ago