brimstone / docker-kaliLinks
A Docker image for bits of Kali Linux
☆31Updated 2 years ago
Alternatives and similar repositories for docker-kali
Users that are interested in docker-kali are comparing it to the libraries listed below
Sorting:
- Masscan integrated with Shodan API☆44Updated 8 years ago
- Shodan.io Command Line Interface☆43Updated 4 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- Use Tor for anonymous scanning with nmap☆91Updated 10 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 7 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆23Updated 9 years ago
- A collection of nmap scripts I've written☆23Updated 9 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 7 years ago
- Scrape pastes from pastebin and archive them for review☆17Updated 6 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆48Updated 9 years ago
- Maltego Transforms, Machines and other extentions☆44Updated 10 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆50Updated 5 years ago
- This tool will harvest valid DNS subdomains from a given domain.☆75Updated 3 years ago
- Active/passive network scanner and autonomous vulnerability assessment application.☆75Updated 5 years ago
- Mattermost - Shodan Slash command☆31Updated 9 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 6 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆42Updated 10 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Updated 4 years ago
- Download files out of open AWS buckets☆38Updated 7 years ago
- Browse and search through nmap's NSE scripts.☆58Updated 8 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 8 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆44Updated 6 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆48Updated 3 years ago
- ssh session type for metasploit☆101Updated 3 years ago
- ☆19Updated 10 years ago
- Maltego Local Transforms for Facebook☆75Updated 8 years ago
- A fully featured backdoor that uses Gmail as a C&C server☆19Updated 10 years ago
- ☆84Updated 2 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago