brimstone / docker-kali
A Docker image for bits of Kali Linux
☆31Updated last year
Related projects: ⓘ
- A Bash script to test a list of URLs for the shellshock vulnerability.☆25Updated 4 years ago
- A fully featured backdoor that uses Gmail as a C&C server☆19Updated 8 years ago
- Browse and search through nmap's NSE scripts.☆59Updated 7 years ago
- A collection of nmap scripts I've written☆23Updated 8 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆33Updated 5 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Masscan integrated with Shodan API☆41Updated 7 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆44Updated 2 years ago
- Scrape pastes from pastebin and archive them for review☆16Updated 5 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆43Updated 7 years ago
- Download files out of open AWS buckets☆37Updated 5 years ago
- Maltego Transforms, Machines and other extentions☆42Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- Automated Security Assessment Reporting Tool☆38Updated 6 years ago
- Search Nmap and Metasploit scanning scripts.☆53Updated 7 years ago
- ☆19Updated 9 years ago
- Search bing with python☆11Updated 9 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 13 years ago
- Massive arsenal of hacker tools...☆75Updated 6 years ago
- A few transforms and a machine for parsing Nmap XML results☆33Updated 8 years ago
- Automate your Kali Linux Penetration Testing toolchain☆29Updated 9 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆12Updated 8 years ago
- Self contained htaccess shells and attacks☆14Updated 6 years ago
- ssh session type for metasploit☆97Updated last year
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- ☆10Updated this week
- Enterprise WPA Wireless Tool Suite☆82Updated 2 years ago