brimstone / docker-kali
A Docker image for bits of Kali Linux
☆31Updated last year
Alternatives and similar repositories for docker-kali:
Users that are interested in docker-kali are comparing it to the libraries listed below
- Scrape pastes from pastebin and archive them for review☆16Updated 5 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- ☆19Updated 9 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Updated 6 years ago
- Metasploit Usage Wiki☆49Updated 9 years ago
- ssh session type for metasploit☆98Updated last year
- Plugins for the King Phisher open source phishing campaign toolkit.☆82Updated 3 years ago
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆12Updated 8 years ago
- Masscan integrated with Shodan API☆41Updated 7 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 9 years ago
- A collection of nmap scripts I've written☆23Updated 8 years ago
- A fully featured backdoor that uses Gmail as a C&C server☆19Updated 9 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Updated 6 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- Download files out of open AWS buckets☆37Updated 6 years ago
- A few transforms and a machine for parsing Nmap XML results☆36Updated 8 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Generate customized and undetectable exploits for Metasploit.☆23Updated 7 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆56Updated 6 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- One-off scripts☆49Updated 7 years ago
- Simple security surveillance script for linux distributions.☆58Updated 8 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 7 years ago
- Use Tor for anonymous scanning with nmap☆79Updated 9 years ago
- A web app scanner☆26Updated 11 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- async web crawler☆27Updated 10 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆14Updated 6 years ago