diwsec / pentdocksLinks
web application pentesting tools for docker
☆18Updated 3 years ago
Alternatives and similar repositories for pentdocks
Users that are interested in pentdocks are comparing it to the libraries listed below
Sorting:
- Bash script for CTF automating basic enumeration☆43Updated 3 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated last year
- Small python script to look for common vulnerabilities on SMTP server.☆50Updated last year
- Central IoC scanner based on Loki☆20Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22Updated 5 months ago
- An automated e-mail OSINT tool☆24Updated 3 years ago
- An exotic service bruteforce tool.☆14Updated 7 months ago
- Just another vulnerable web application.☆36Updated last year
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆18Updated 2 years ago
- ☆12Updated 3 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- The DNS Hunt will make your life easier, and of course faster.☆48Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- Perform OSINT on external targets using Shodan☆22Updated last year
- A wacky exploitation framework written in pure python3.☆24Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Simple API for storing all incoming XSS requests and various XSS templates.☆48Updated last year
- A tool designed to analyse email headers☆38Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- Free Advance encryptor for Anon Cloud☆16Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆63Updated 3 years ago
- A tool for steganography of png files .☆24Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆17Updated last month
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Updated 4 years ago
- Burp suite Certificate modification tool☆18Updated 2 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago