A kalilinux/kali-rolling container with extra juice.
☆20Jan 5, 2026Updated 2 months ago
Alternatives and similar repositories for kali-artis3n
Users that are interested in kali-artis3n are comparing it to the libraries listed below
Sorting:
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- ⚙ DevSecOps Kubernetes Playground ("A Hacker's Guide to Kubernetes")☆18Sep 29, 2023Updated 2 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Jun 2, 2016Updated 9 years ago
- All my dotfiles that I port around from system to system with me☆18Mar 1, 2026Updated last week
- Ubuntu based privateinternetaccess.com Proxy Box with Squid(http proxy), Deluge (torrenting including port mapping), Dante(Socks5)☆21Dec 19, 2024Updated last year
- Automatically spin up infra for phishing☆64Feb 1, 2020Updated 6 years ago
- Linux下的设备管理器(支持硬件信息检测、设备驱动安装和硬件性能测试)☆10Oct 22, 2013Updated 12 years ago
- Webshell, Virtual Private Server (VPS) and cPanel Database☆39Sep 2, 2022Updated 3 years ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- Various scripts & tools☆12Apr 22, 2024Updated last year
- Mozilla list of RPs and Groups for SSO-Dashboard☆12Updated this week
- python黑客与一些脚本☆10Jul 18, 2019Updated 6 years ago
- Remove stop words from a string☆15Feb 24, 2023Updated 3 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆51Dec 8, 2022Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- A simple bash script to remove (purge) unused linux kernels☆11Mar 9, 2017Updated 9 years ago
- VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.☆16Feb 13, 2024Updated 2 years ago
- nmap + masscan scan☆14Dec 15, 2022Updated 3 years ago
- Compiled binaries of various security tools☆14May 19, 2021Updated 4 years ago
- red team tips and trix☆12Jun 27, 2025Updated 8 months ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- Hand-made Improved Nuclei Templates!🪴☆13Jun 12, 2023Updated 2 years ago
- Examples for using Xepor framework☆11Jul 4, 2023Updated 2 years ago
- Docker-compose, Apache, MySQL, PHP, LetsEncrypt☆11Jul 24, 2017Updated 8 years ago
- 域名接管漏洞,批量检测工具☆11Oct 29, 2020Updated 5 years ago
- A Simple AES Command Line Crypter☆39Jan 19, 2023Updated 3 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- Notify is a helper utility written in Go that allows you to post output to multiple platforms.☆18May 27, 2022Updated 3 years ago
- A simple BOF that disables some logging with NtSetInformationProcess☆13Oct 13, 2023Updated 2 years ago
- Documentation on everything, freely available. Maintained by @userbradley. ISSN: 2755-8169☆11Updated this week
- XXE漏洞检测 Payload大全☆13Apr 28, 2019Updated 6 years ago
- exploitpack extracted from a honeynet which is being prepared by intruduers to be used as an exploitation infrastructure☆12Feb 17, 2022Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆11Nov 16, 2019Updated 6 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Oct 22, 2020Updated 5 years ago
- Your everyday Linux distribution gone Super Saiyan.☆62Oct 13, 2023Updated 2 years ago
- ☆14Jun 1, 2022Updated 3 years ago
- 使用浏览器爬虫获取网站全链接扫描log4j2漏洞 / Use a browser crawler to get the full link of the website and scan the log4j2 vulnerability☆12Mar 31, 2022Updated 3 years ago