hackerschoice / docker-thc-hacker
Docker environment for hackers
☆14Updated 4 years ago
Alternatives and similar repositories for docker-thc-hacker:
Users that are interested in docker-thc-hacker are comparing it to the libraries listed below
- Binary and Static Releases☆14Updated 3 weeks ago
- ☆37Updated 2 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 7 years ago
- Secure File Transfer via Global Socket Bounce Network☆24Updated 4 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- THC "R U There" network discovery tool☆27Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Normalizing bash administration and development across different OS-es and distributions☆10Updated last year
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆14Updated last year
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Command-line client to interact with Hack The Box☆16Updated 5 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 3 years ago
- Scan for subdomains using bruteforcing techniques☆45Updated 9 months ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 2 years ago
- A tiny set of helper scripts for ipinfo☆17Updated 4 years ago
- SSH brute-force script created for HackTheBox☆15Updated 5 years ago
- A utility to decrypt and retrieve encrypted data (either cookies or login credentials) from Chromium SQLite databases.☆10Updated last year
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- an OSINT tool to scrape sub domains from the Virus Total API☆23Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year
- A simple web interface for Nmap with a XML to JSON reports converter☆13Updated 4 years ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆41Updated 5 years ago
- CISOfy Handbook☆33Updated 8 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- Does a dictionary lookup on common, valuable hostnames for a given domain.☆25Updated 2 years ago
- ☆27Updated 3 years ago
- YASS (Yet Another Subdomainer Software) is a plugin-powered search engine based subdomainer.☆10Updated last year
- Modified cryptsetup to enable password guessing - https://diverto.github.io/2019/11/18/Cracking-LUKS-passphrases☆17Updated 5 years ago
- A simple shell module for helping you to write better scripts. With this little module you can use some functions that allow you to showi…☆18Updated 3 years ago