appsecco / docker-datasploit
Docker container for datasploit framework
☆26Updated 7 years ago
Alternatives and similar repositories for docker-datasploit:
Users that are interested in docker-datasploit are comparing it to the libraries listed below
- Passive recon / OSINT automation script☆40Updated 6 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- A collection of scripts made duing my personal research☆28Updated 6 years ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- Plugins for the Serpico Project☆22Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- This tool helps you pentest THE PAST of a website.☆16Updated 4 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- A collection of nmap scripts I've written☆23Updated 8 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆14Updated 7 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆11Updated 7 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 7 years ago
- Lair Framework dockerized.☆38Updated 3 years ago
- Flash crossdomain policy security checker☆25Updated 9 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Ansible scripts to build an attack box☆22Updated 6 years ago