Docker container for datasploit framework
☆25Aug 3, 2017Updated 8 years ago
Alternatives and similar repositories for docker-datasploit
Users that are interested in docker-datasploit are comparing it to the libraries listed below
Sorting:
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Dec 7, 2016Updated 9 years ago
- This tool helps you pentest THE PAST of a website.☆15Jul 13, 2025Updated 7 months ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Apr 4, 2019Updated 6 years ago
- A simple app to demo SQL Injection login bypass☆26Dec 15, 2020Updated 5 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Dec 11, 2022Updated 3 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- Ansible role to configure redirectors for red team C2☆30Nov 12, 2018Updated 7 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- ☆16Oct 24, 2018Updated 7 years ago
- ☆15Jun 17, 2016Updated 9 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Dec 7, 2018Updated 7 years ago
- A collection of Open Data for the data freaks out there.☆37Jan 4, 2018Updated 8 years ago
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago
- Docker + Travis-CI + Cron + JohnTheRipper(Jumbo) = Bleeding edge builds☆17Mar 7, 2018Updated 7 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- ☆14Jun 7, 2017Updated 8 years ago
- This repo contains workshop material delivered at #nullcon2020☆16Mar 6, 2020Updated 5 years ago
- A talk+workshop on Accelerating Your Security Learning in 2017 given at null Bangalore 2017☆13Jan 23, 2017Updated 9 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆15Dec 3, 2017Updated 8 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 9 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Oct 8, 2014Updated 11 years ago
- Burp Suite extension for parsing Swagger web service definition files☆19Jul 15, 2025Updated 7 months ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Aug 17, 2014Updated 11 years ago
- Actarus is a custom tool for bug bounty☆77Nov 14, 2019Updated 6 years ago
- WAScan - Web Application Scanner☆19Mar 22, 2018Updated 7 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆26Aug 8, 2023Updated 2 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Jan 17, 2020Updated 6 years ago
- AutoBrowser Screenshot☆49Oct 27, 2016Updated 9 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- A curated list of tools for incident response☆34Mar 2, 2024Updated last year
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆32Feb 16, 2026Updated last week
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- Damn Vulnerable Java (EE) Application☆145Jan 23, 2024Updated 2 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago