eikendev / hackenvLinks
Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs, Hack The Box, etc.)
☆21Updated last month
Alternatives and similar repositories for hackenv
Users that are interested in hackenv are comparing it to the libraries listed below
Sorting:
- Analyse binaries for missing security features, information disclosure and more...☆86Updated 2 years ago
- A command based package for simple display of statistics☆25Updated 9 months ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Updated 2 years ago
- Network Policy Helper☆24Updated last week
- A fast GitHub stargazers information gathering tool☆73Updated 3 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆27Updated 2 years ago
- The WASM Based Security Toolkit for the Web First Paradigm☆37Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated 2 weeks ago
- Personal Collection of Awesome Google Dorks☆30Updated 6 years ago
- ☆29Updated last week
- A repository for maintaining a list of the top domains based on multiple lists☆22Updated 3 years ago
- Tiny embeddable dns server☆52Updated this week
- Docker environment for hackers☆17Updated 5 years ago
- A tool for sorting blocks of lines☆38Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆52Updated 10 months ago
- Faraday's Command Line Interface☆51Updated 2 weeks ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- Bypassing AWS WAF using a single ';'☆40Updated 7 years ago
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆30Updated last year
- Subdomain enumeration using Cloudflare's scanning tool.☆46Updated 2 months ago
- roundrobin with configurable rotating strategies☆14Updated 2 years ago
- Signing-key abuse and update exploitation framework☆130Updated 4 months ago
- whois command implemented by golang with awesome whois servers list☆65Updated 2 years ago
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.☆15Updated 5 years ago
- A tool to list the SSH clone URLs for all GitHub repos for a given user☆15Updated 9 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆62Updated 4 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆19Updated 2 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆58Updated this week