brimstone / docker-kaliLinks
A Docker image for bits of Kali Linux
☆31Updated 2 years ago
Alternatives and similar repositories for docker-kali
Users that are interested in docker-kali are comparing it to the libraries listed below
Sorting:
- Scrape pastes from pastebin and archive them for review☆17Updated 6 years ago
- Download files out of open AWS buckets☆38Updated 7 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 7 years ago
- Shodan.io Command Line Interface☆43Updated 4 years ago
- Masscan integrated with Shodan API☆43Updated 8 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆44Updated 6 years ago
- Maltego Transforms, Machines and other extentions☆44Updated 10 years ago
- Python backdoor that uses http post/get requests to communicate☆41Updated 9 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Updated 4 years ago
- Different utility scripts for pentesting and hacking.☆43Updated 8 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 7 years ago
- Use Tor for anonymous scanning with nmap☆86Updated 10 years ago
- Search Nmap and Metasploit scanning scripts.☆53Updated 8 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- ☆19Updated 10 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆48Updated 8 years ago
- A collection of nmap scripts I've written☆23Updated 9 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆51Updated 4 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆33Updated 6 years ago
- Browse and search through nmap's NSE scripts.☆58Updated 8 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆38Updated 7 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- Massive arsenal of hacker tools...☆78Updated 8 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆47Updated 3 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Various penetration testing tools written in Python. Based mostly on ideas and implementations presented in 'Violent Python: A Cookbook f…☆69Updated 9 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆44Updated 10 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Updated 10 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Updated 6 years ago