arhaxor21 / FlagyLinks
This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people have some trouble installing tools for the beginning stages.
☆12Updated 3 years ago
Alternatives and similar repositories for Flagy
Users that are interested in Flagy are comparing it to the libraries listed below
Sorting:
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Updated 7 months ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Updated 5 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- Script en Bash que automatiza todos los pasos para retransmitir la solicitud de autenticación SMB con el objetivo de obtener una Shell.☆25Updated last month
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 4 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆19Updated 7 months ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆36Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- web application pentesting tools for docker☆18Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Perform OSINT on external targets using Shodan☆22Updated last year
- Red Team Server (RTS)☆16Updated last year
- Just another vulnerable web application.☆36Updated last year
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 4 years ago
- Burp suite Certificate modification tool☆18Updated 2 years ago
- An exotic service bruteforce tool.☆14Updated 5 months ago
- ☆12Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆20Updated 2 years ago