brimstone / docker-kali
A Docker image for bits of Kali Linux
☆31Updated 2 years ago
Alternatives and similar repositories for docker-kali:
Users that are interested in docker-kali are comparing it to the libraries listed below
- Masscan integrated with Shodan API☆41Updated 7 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Generate customized and undetectable exploits for Metasploit.☆24Updated 7 years ago
- Massive arsenal of hacker tools...☆78Updated 7 years ago
- Scrape pastes from pastebin and archive them for review☆16Updated 6 years ago
- Python backdoor that uses http post/get requests to communicate☆40Updated 8 years ago
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 7 years ago
- Download files out of open AWS buckets☆38Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 6 years ago
- ☆19Updated 10 years ago
- A collection of nmap scripts I've written☆23Updated 9 years ago
- A Python Script To Automatically Download, Provision and Update a Kali Linux VM in Virtualbox☆46Updated 4 years ago
- 👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡☆30Updated 6 years ago
- One-off scripts☆51Updated 7 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 3 years ago
- A fully featured backdoor that uses Gmail as a C&C server☆19Updated 9 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- Use Tor for anonymous scanning with nmap☆84Updated 9 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Updated 10 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆12Updated 8 years ago
- A web app scanner☆26Updated 11 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆56Updated 6 years ago
- Maltego with a twist of wireless☆25Updated 10 years ago