arhaxor21 / FlagyLinks
This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people have some trouble installing tools for the beginning stages.
☆12Updated 3 years ago
Alternatives and similar repositories for Flagy
Users that are interested in Flagy are comparing it to the libraries listed below
Sorting:
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Updated 3 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 4 years ago
- An exotic service bruteforce tool.☆13Updated 7 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated 2 months ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- Central IoC scanner based on Loki☆20Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Site fast fuzzing with chorme extension.☆24Updated 3 years ago
- Burp suite Certificate modification tool☆18Updated 2 years ago
- Script en Bash que automatiza todos los pasos para retransmitir la solicitud de autenticación SMB con el objetivo de obtener una Shell.☆24Updated 4 months ago
- Simple recon tool automates your recon process☆17Updated 2 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- web application pentesting tools for docker☆18Updated 3 years ago
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Red Team Server (RTS)☆16Updated last year
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 4 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆50Updated 3 weeks ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- ☆10Updated 3 years ago
- ☆29Updated 2 years ago