brimstone / docker-kaliLinks
A Docker image for bits of Kali Linux
☆31Updated 2 years ago
Alternatives and similar repositories for docker-kali
Users that are interested in docker-kali are comparing it to the libraries listed below
Sorting:
- Shodan.io Command Line Interface☆44Updated 4 years ago
- Scrape pastes from pastebin and archive them for review☆16Updated 6 years ago
- Masscan integrated with Shodan API☆42Updated 8 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆22Updated 8 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆46Updated 3 years ago
- Use Tor for anonymous scanning with nmap☆84Updated 10 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Updated 6 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- Active/passive network scanner and autonomous vulnerability assessment application.☆76Updated 5 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- ☆82Updated last year
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- Different utility scripts for pentesting and hacking.☆48Updated 7 years ago
- A collection of nmap scripts I've written☆23Updated 9 years ago
- scythe: account enumerator☆61Updated 12 years ago
- Search Nmap and Metasploit scanning scripts.☆55Updated 7 years ago
- ☆19Updated 10 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- Download files out of open AWS buckets☆38Updated 6 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆56Updated 6 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆50Updated 4 years ago