Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.
☆75Dec 21, 2020Updated 5 years ago
Alternatives and similar repositories for bento
Users that are interested in bento are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Dec 2, 2020Updated 5 years ago
- Office 365 and Exchange domain federation enumeration tool☆13Sep 6, 2023Updated 2 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Manticore Adversary Emulation Cli☆47Aug 4, 2020Updated 5 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆355Oct 14, 2020Updated 5 years ago
- A Docker image with Dradis: A collaboration and reporting platform for IT security experts.☆12Apr 9, 2024Updated 2 years ago
- Full Antivirus Evasion for Mimikatz☆14Mar 10, 2017Updated 9 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆225Feb 9, 2021Updated 5 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Jun 27, 2022Updated 3 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- This BOT retweets everything related to Cyber Security,☆26Jan 20, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Decrypt encrypted SonicOSX firmware images☆19Feb 24, 2025Updated last year
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Apr 14, 2023Updated 3 years ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- ☆19Mar 16, 2021Updated 5 years ago
- CloudMapper helps you analyze your Amazon Web Services (AWS) environments.☆11Nov 8, 2021Updated 4 years ago
- This is a PAM Skeleton Key that can be used for persistence, lateral movement, and privilege escalation.☆43Apr 23, 2026Updated last week
- A notification script to help with Recon Stuff☆14Jun 8, 2021Updated 4 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Nov 29, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Mar 4, 2022Updated 4 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Jul 17, 2018Updated 7 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Dec 22, 2021Updated 4 years ago
- ☆29Jan 31, 2025Updated last year
- generate reverse shell from CLI for linux and Windows.☆248Sep 17, 2020Updated 5 years ago
- python based backdoor software☆17Oct 14, 2011Updated 14 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A Passive SSH back-end and scanner.☆105Jun 18, 2025Updated 10 months ago
- Burp Suite extension to track vulnerability assessment progress☆59Mar 7, 2020Updated 6 years ago
- ☆12Feb 18, 2021Updated 5 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35May 19, 2019Updated 6 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- ☆16Jul 14, 2020Updated 5 years ago