baguswiratmaadi / catnipView external linksLinks
Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux
☆123Apr 13, 2019Updated 6 years ago
Alternatives and similar repositories for catnip
Users that are interested in catnip are comparing it to the libraries listed below
Sorting:
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- Automated Pentest Tools Designed For Parrot Linux☆84Apr 23, 2019Updated 6 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 4 years ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- ☆176Jul 5, 2023Updated 2 years ago
- An OSINT Metadata analyzing tool that filters through tags and creates reports☆118Mar 18, 2019Updated 6 years ago
- ☆25May 9, 2021Updated 4 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- Automate Metasploit scanning and exploitation☆117Jul 20, 2025Updated 6 months ago
- A tool to automate penetration tests☆382Mar 9, 2024Updated last year
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆247Nov 17, 2019Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Jul 2, 2018Updated 7 years ago
- Mobile application testing toolkit☆244Nov 8, 2018Updated 7 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Apr 29, 2019Updated 6 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- Automated SonarQube☆70Jun 3, 2019Updated 6 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆77Apr 26, 2019Updated 6 years ago
- AMIRA: Automated Malware Incident Response & Analysis☆151Feb 3, 2026Updated 2 weeks ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆98Aug 13, 2022Updated 3 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Jun 25, 2020Updated 5 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆126Apr 16, 2019Updated 6 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆246Oct 22, 2021Updated 4 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆537Mar 27, 2022Updated 3 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆104Feb 6, 2018Updated 8 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Dec 8, 2022Updated 3 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago