brimstone / docker-kaliLinks
A Docker image for bits of Kali Linux
☆31Updated 2 years ago
Alternatives and similar repositories for docker-kali
Users that are interested in docker-kali are comparing it to the libraries listed below
Sorting:
- Scrape pastes from pastebin and archive them for review☆17Updated 6 years ago
- Masscan integrated with Shodan API☆44Updated 8 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 6 years ago
- A few transforms and a machine for parsing Nmap XML results☆39Updated 9 years ago
- ☆84Updated 2 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 7 years ago
- Shodan.io Command Line Interface☆43Updated 4 years ago
- ☆19Updated 10 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Updated 4 years ago
- A Python Script To Automatically Download, Provision and Update a Kali Linux VM in Virtualbox☆47Updated 5 years ago
- Search Nmap and Metasploit scanning scripts.☆53Updated 8 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 7 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Updated 6 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆23Updated 9 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Updated 6 years ago
- Active/passive network scanner and autonomous vulnerability assessment application.☆75Updated 5 years ago
- Python backdoor that uses http post/get requests to communicate☆42Updated 9 years ago
- Use Tor for anonymous scanning with nmap☆88Updated 10 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆48Updated 9 years ago
- ☆58Updated 11 years ago
- ESPot - ElasticSearch Honeypot☆28Updated 11 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 7 years ago
- Maltego Transforms, Machines and other extentions☆44Updated 10 years ago
- ssh session type for metasploit☆101Updated 2 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆48Updated 3 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 8 years ago
- ☆40Updated 7 years ago
- apbleed☆24Updated 11 years ago
- Automated Security Assessment Reporting Tool☆37Updated 8 years ago