csalab-id / kalilinux-dockerLinks
Kali Linux on browser (Docker)
☆49Updated 3 weeks ago
Alternatives and similar repositories for kalilinux-docker
Users that are interested in kalilinux-docker are comparing it to the libraries listed below
Sorting:
- This Kali Linux Docker container offers a full desktop experience by using the tightvncserver to provide a VNC connection to the containe…☆87Updated 2 years ago
- PrivacyNet: Privacy Network☆47Updated 8 months ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated 2 weeks ago
- Cyber Security Awareness Framework (CSAF)☆98Updated 2 months ago
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆50Updated 3 months ago
- ☆93Updated 2 months ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated 9 months ago
- A collection of config files for linux focusing on hackthebox theme☆45Updated 5 months ago
- OSCP preperation and HackTheBox write ups.☆60Updated 2 years ago
- Play Hack The Box directly on your system.☆49Updated last month
- ☆31Updated 2 months ago
- A terminal plugin to make Kali Linux objectively better - compatible with ohmyzsh☆16Updated last year
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆63Updated this week
- Active Directory Penetration Testing Tool☆34Updated last year
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆27Updated 6 months ago
- Kali Packerge Manager☆65Updated last year
- A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1☆20Updated last year
- A second brain used to store knowledge acquired through various academic pursuits, certifications, and technical projects.☆26Updated this week
- A tool for Oragnized ASM (Attack Surface Mapper). Subdomains enumeration, IPs scans, Vulnerability assesment...☆37Updated last year
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆26Updated 2 years ago
- ☆18Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- This Python script allows you to generate Nessus Professional Keys directly without having to fill out the registration form. It simplifi…☆91Updated 9 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- ☆40Updated last year
- Automated Active Directory lab running on Proxmox☆77Updated last month
- Aliases and functions for the lazy penetration tester☆68Updated last year
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆76Updated 2 years ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Updated 11 months ago
- NetProbe: Network Probe☆159Updated 7 months ago