eikendev / hackenv
Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs, Hack The Box, etc.)
☆20Updated last week
Alternatives and similar repositories for hackenv:
Users that are interested in hackenv are comparing it to the libraries listed below
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆13Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆32Updated 3 weeks ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 2 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- The WASM Based Security Toolkit for the Web First Paradigm☆35Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- A command based package for simple display of statistics☆22Updated 3 months ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Python support package to parse IP and host inputs from network based tooling☆11Updated last year
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆18Updated 2 years ago
- whois command implemented by golang with awesome whois servers list☆63Updated last year
- Analyse binaries for missing security features, information disclosure and more...☆86Updated last year
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆29Updated last year
- ☆14Updated 4 years ago
- ☆10Updated last year
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆26Updated 2 months ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆14Updated 2 years ago
- A tool for sorting blocks of lines☆39Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- ☆16Updated last year
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆25Updated last year
- Local Privilege Escalation Miner☆25Updated 2 years ago
- Bypassing AWS WAF using a single ';'☆40Updated 6 years ago
- List of sources for cybersecurity news☆36Updated 2 years ago
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆25Updated this week
- roundrobin with configurable rotating strategies☆15Updated last year