Docker images for infosec tools
☆156Jul 14, 2017Updated 8 years ago
Alternatives and similar repositories for sec-tools
Users that are interested in sec-tools are comparing it to the libraries listed below
Sorting:
- a passive scanner based on Mitmproxy and Arachni☆108Aug 17, 2017Updated 8 years ago
- 一个监控 pastebin 的敏感内容,并发微博的 bot☆15Sep 12, 2017Updated 8 years ago
- a collection of payloads for common webapps☆72Apr 24, 2013Updated 12 years ago
- Docker image for DVWA(Damn Vulnerable Web Application)☆103Dec 1, 2016Updated 9 years ago
- Easy automated vulnerability scanning, reporting and analysis☆709Jan 10, 2020Updated 6 years ago
- 从扫描器结果分离出的一些大公司泛解析ip列表☆60Jun 8, 2017Updated 8 years ago
- 用于扫描git,svn泄露☆78Jul 29, 2015Updated 10 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- A Framework for Comparing Password Guessing Strategies☆129Jul 11, 2019Updated 6 years ago
- A tool help get the basic information of one site☆107Jan 14, 2019Updated 7 years ago
- Improved decoder for Burp Suite☆138Aug 30, 2021Updated 4 years ago
- ☆22Oct 13, 2017Updated 8 years ago
- 一些漏洞场景的还原,基于https://www.exploit-db.com/☆37Feb 7, 2018Updated 8 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆382Nov 2, 2017Updated 8 years ago
- ☆14May 13, 2018Updated 7 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container☆32Apr 7, 2018Updated 7 years ago
- Penetration Test Vulnerabilities Manager is an extension for Burp Suite, written in Jython. It was developed by Barak Tawily in order to …☆31Jul 25, 2021Updated 4 years ago
- shARP_2.0 is an updated version for shARP with more options for better performance.☆12Oct 12, 2017Updated 8 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Sep 13, 2017Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆573Dec 9, 2017Updated 8 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]☆305Oct 14, 2018Updated 7 years ago
- nmap service and application version detection (without nmap installation)☆115Dec 12, 2017Updated 8 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆97Jul 9, 2020Updated 5 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- 📡 A security research tool with shodan integration☆25Sep 6, 2018Updated 7 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Nov 12, 2014Updated 11 years ago
- A ton of helpful tools☆344Oct 8, 2021Updated 4 years ago
- public exploits☆35May 11, 2023Updated 2 years ago
- DoS PoC's for SAP products☆51Jan 23, 2018Updated 8 years ago
- Exploit code developed/reproduced by me☆90Jan 25, 2023Updated 3 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago