bcapptain / dockernymous
A script used to create a whonix like gateway/workstation environment with docker containers.
☆124Updated 5 years ago
Alternatives and similar repositories for dockernymous:
Users that are interested in dockernymous are comparing it to the libraries listed below
- Easily setup a hidden service inside the Tor network☆173Updated last year
- Operational Security utility and automator.☆133Updated 4 years ago
- ProxyDock is a Dockerfile and Bash script that converts your OpenVPN files into local proxies.☆137Updated 4 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- Collect information about email addresses from Pastebin☆35Updated 3 years ago
- A curated list of awesome Internet port and host scanners, plus related components and much more, with a focus on free and open source pr…☆220Updated 2 years ago
- The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/The…☆35Updated 4 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆200Updated 5 years ago
- Use Tor for anonymous scanning with nmap☆79Updated 9 years ago
- Fresh Onions is an open source TOR spider / hidden service onion crawler☆80Updated 5 years ago
- tor-openwrt☆40Updated 9 years ago
- vulnerability scanner tool using nmap and nse scripts☆204Updated 6 months ago
- A unified console to perform the "kill chain" stages of attacks.☆200Updated last year
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆370Updated last year
- Fetch, install and search exploit archives from exploit sites.☆111Updated last year
- A tool to generate media files with malicious metadata☆124Updated 5 years ago
- ssh public host key scanner using shodan☆117Updated 5 years ago
- Offensive tools as Dockerfiles. Lightweight & Ready to go☆202Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Updated 6 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆123Updated 6 years ago
- Auto discover and exploit LAN raspberry pi's☆107Updated 9 months ago
- POOPAK - TOR Hidden Service Crawler☆135Updated 6 months ago
- A poorman's proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxies☆132Updated last year
- osint_tools_security_auditing☆149Updated 8 years ago
- Parser for data dumps Collection #1 / Collection #2-5☆144Updated 5 years ago
- Easy way to brute-force web directory.☆147Updated 5 years ago
- unix SSH post-exploitation 1337 tool☆134Updated 6 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆236Updated 4 years ago
- Passive Vulnerability Auditor☆130Updated 8 years ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆97Updated last month