The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary libraries, drivers, and tools.
☆15Apr 11, 2022Updated 3 years ago
Alternatives and similar repositories for lazybox
Users that are interested in lazybox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated 2 months ago
- Herramienta para realizar fuerza bruta a diferentes servicios.☆10Sep 13, 2021Updated 4 years ago
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆18Oct 11, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Jok3r - Network and Web Pentest Framework☆17Apr 21, 2019Updated 6 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Jul 21, 2019Updated 6 years ago
- A multi-client reverse shell that allows multiple connections from target computers☆19Oct 25, 2025Updated 5 months ago
- A python server tool based on flask , this tool can phish some Facebook credentials!☆17Jun 22, 2019Updated 6 years ago
- DNS isteklerini veya trafiği kendi istediğiniz yere yönlendirerek hedef web sitesini manipüle etmenize yarayan bir script.☆14Jun 24, 2020Updated 5 years ago
- your bestfried for finding LinkedIn Employees on github☆15Mar 28, 2023Updated 2 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆32Aug 29, 2021Updated 4 years ago
- A tool designed to analyse email headers☆40Oct 4, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- A simple tool which makes creating nuclei templates even easier.☆37Jun 23, 2024Updated last year
- Journey to Try Harder !!!☆31Aug 30, 2019Updated 6 years ago
- 🔥Ready, Aim, Fire.🔥☆18Jun 3, 2022Updated 3 years ago
- Mac and hostname random changer☆43Oct 12, 2017Updated 8 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- Script to facilitate different functions and checks☆44Aug 4, 2022Updated 3 years ago
- Based on reading from The Hackers Playbook 3☆30Mar 15, 2020Updated 6 years ago
- X_INSTA Powerful INSTAGRAM Password Brute Force Tool For Windows☆31Dec 8, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- A library to modify another program's memory on linux x64.☆16Sep 10, 2025Updated 6 months ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆38Jun 30, 2018Updated 7 years ago
- PathBuster - multiple hosts Web path scanner☆23Jun 3, 2024Updated last year
- A modular URL deduplication tool.☆19Feb 19, 2025Updated last year
- SQL Detector Tool In Go Language☆22Jan 10, 2023Updated 3 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆13Mar 6, 2023Updated 3 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆55Oct 1, 2020Updated 5 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- This script helps to pass through the captive portals in public Wi-Fi networks. It hijacks IP and MAC from somebody who is already connec…☆30May 10, 2018Updated 7 years ago
- Recon Automation☆11Sep 14, 2024Updated last year
- BurpSuite extension to convert requests into bcheck scripts☆33Jul 18, 2023Updated 2 years ago