eikendev / hackenv
Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs, Hack The Box, etc.)
☆21Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for hackenv
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆13Updated last year
- A repository for maintaining a list of the top domains based on multiple lists☆20Updated 2 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- A tool to run nmap against each line in a script.☆16Updated 3 years ago
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆29Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Python support package to parse IP and host inputs from network based tooling☆11Updated last year
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆26Updated last month
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 2 years ago
- A tiny set of helper scripts for ipinfo☆17Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- Install and upgrade projectdiscovery tools☆10Updated 2 years ago
- Web crawler and downloader based on GNU Wget.☆12Updated last year
- Fork of https://github.com/PortSwigger/param-miner for header smuggling research☆12Updated 3 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- A collection of personal ZAP scripts☆13Updated last year
- Write-Ups for TryHackMe☆22Updated 3 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 3 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆11Updated 3 years ago
- Developper-proof prevention of SQL injection (java library)☆11Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 8 months ago
- Modular C2 server to tame your pack of wolves☆12Updated last year
- Create an AMI with CobaltStrike and related tools.☆8Updated 3 months ago
- Fast and passive subdomain enumeration.☆14Updated 2 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆17Updated last year
- Remove Offensive and Profane Words from Wordlists☆14Updated last year