csalab-id / kalilinux-docker
Kali Linux on browser (Docker)
☆33Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for kalilinux-docker
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆24Updated 8 months ago
- AI Powered Terminal Based Ethical Hacking Assistant☆51Updated 6 months ago
- Kali Packerge Manager☆50Updated last year
- DPULSE - Tool for complex approach to domain OSINT☆82Updated this week
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆12Updated 9 months ago
- ☆58Updated 6 months ago
- This repo contains scripts to install a SIEM (Elasticsearch, Kibana and Filebeat) , HIDS (Wazuh Manager) and NIDS (Suricata)☆17Updated 7 months ago
- ☆35Updated 11 months ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆22Updated 4 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆34Updated 2 weeks ago
- Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).☆108Updated 9 months ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆89Updated last year
- MS Graph Commands and Tools for Blue Teamers☆48Updated 11 months ago
- Visualize BBOT scans in realtime with VivaGraphJS☆22Updated last week
- Powershell script to help Speed up Threat hunting incident response processes☆45Updated 9 months ago
- Mass bruteforce authentication of network protocols☆44Updated 11 months ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆33Updated 3 weeks ago
- Chrome extension tool for OSINT & Recon☆50Updated 8 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆35Updated 8 months ago
- Interactive navi redteam cheats☆27Updated 5 months ago
- Tools and Resources for Physical Security Red Teaming☆24Updated 3 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆26Updated 3 months ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway☆28Updated last year
- Capture screenshots of onion services on an onion service.☆49Updated 5 months ago
- Top 400 passwords as per HaveIBeenPwned☆20Updated last month
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 6 months ago
- DNSrecon tool with GUI for Kali Linux☆56Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 7 months ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago