A script used to create a whonix like gateway/workstation environment with docker containers.
☆127Oct 13, 2019Updated 6 years ago
Alternatives and similar repositories for dockernymous
Users that are interested in dockernymous are comparing it to the libraries listed below
Sorting:
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Operational Security utility and automator.☆142Jul 21, 2020Updated 5 years ago
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Sep 6, 2017Updated 8 years ago
- Real Time Threat Monitoring Tool☆114Nov 16, 2022Updated 3 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 4 years ago
- This tool helps you pentest THE PAST of a website.☆15Jul 13, 2025Updated 7 months ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- ☆25May 9, 2021Updated 4 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- ☆128May 22, 2023Updated 2 years ago
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆123Apr 13, 2019Updated 6 years ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- Check if a IP is from tor or is a malicious proxy☆57Feb 9, 2021Updated 5 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆68Jan 15, 2026Updated last month
- Script to automate PUT HTTP method exploitation to get shell☆125Jun 25, 2020Updated 5 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆126Apr 16, 2019Updated 6 years ago
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆291Jan 5, 2026Updated last month
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 5 years ago
- Random IPv6 - circumvents restrictive IP address-based filter and blocking rules☆23Jun 14, 2016Updated 9 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Nov 27, 2018Updated 7 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- Hunt Open MongoDB instances☆79Sep 25, 2019Updated 6 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- An OSINT Metadata analyzing tool that filters through tags and creates reports☆119Mar 18, 2019Updated 6 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- PFI (Port Forwarding Interceptor)☆46Jan 29, 2026Updated last month
- Intelligence and Reconnaissance Package/Bundle installer.☆248Nov 11, 2020Updated 5 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 7 months ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Aug 9, 2017Updated 8 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago