A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWHF 2018 security conference
☆17Jun 23, 2021Updated 4 years ago
Alternatives and similar repositories for proxycannon-ng
Users that are interested in proxycannon-ng are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 记录整理日常java安全分析代码☆14Dec 25, 2018Updated 7 years ago
- ☆15May 17, 2018Updated 7 years ago
- Create and Destroy DigitalOcean droplets. Backed by Ansible☆11Jan 13, 2019Updated 7 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Jun 21, 2021Updated 4 years ago
- ETL调度管理平台☆12Nov 21, 2022Updated 3 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Mar 3, 2023Updated 3 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- A Python start-up script implementing an enhanced interpreter☆12Apr 16, 2014Updated 11 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Jun 9, 2021Updated 4 years ago
- Tool for performing lots of DNS queries quickly☆18May 29, 2015Updated 10 years ago
- java web 压缩文件 安全 漏洞☆20Mar 17, 2020Updated 6 years ago
- ☆10Updated this week
- Simple fork from degoogle original project with bug hunting purposes☆91Jun 15, 2022Updated 3 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- Panoptes Endpoint Detection and Response Solution☆43Mar 7, 2026Updated 2 weeks ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆219Jan 18, 2023Updated 3 years ago
- whoami / my profile☆20Jan 6, 2026Updated 2 months ago
- A simple Node.js Express REST app with some OWASP vulnerabilities.☆22Aug 13, 2024Updated last year
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- docker build nessus with unlimited ip☆13Aug 23, 2021Updated 4 years ago
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 10 months ago
- An ansible role that creates a DigitalOcean droplet and returns the droplet's IP address for further use in playbooks☆21Jul 6, 2018Updated 7 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- java 安全工具类 (信息摘要MD5,对称加密AES,非对称加密RSA,数字签名DSA)☆21May 13, 2024Updated last year
- Semantic prefix map registry☆13Feb 20, 2026Updated last month
- ☆41Jul 4, 2018Updated 7 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- AWS Certified Developer - Associate Certification by Packt Publishing☆12Oct 17, 2023Updated 2 years ago
- A Rust-based agent orchestrator enabling a swarm of Claude Code instances building software.☆32Updated this week
- pyqt based plotters intended for plotting bursted events in gnu radio☆29May 17, 2017Updated 8 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- Logging tool intended for red team usage☆36Dec 5, 2025Updated 3 months ago