jlevitsk / lazykaliView external linksLinks
A refresh of LazyKali which simplifies install of tools and configuration. Original author appears missing.
☆48Sep 4, 2016Updated 9 years ago
Alternatives and similar repositories for lazykali
Users that are interested in lazykali are comparing it to the libraries listed below
Sorting:
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- ☆12Feb 24, 2023Updated 2 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28May 23, 2023Updated 2 years ago
- masscan result parsing, web server fingerprinting☆17Jul 24, 2022Updated 3 years ago
- ☆28Jun 10, 2016Updated 9 years ago
- Normalizer for honeypot data.☆46Jun 19, 2015Updated 10 years ago
- Lite version of PDF X-RAY that uses no backend☆38Nov 11, 2011Updated 14 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆39Apr 15, 2017Updated 8 years ago
- Collection of my Python Scripts☆41Aug 14, 2020Updated 5 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 3 years ago
- WordPress Honeypot☆35Jan 18, 2018Updated 8 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆59Oct 10, 2015Updated 10 years ago
- python script allow red teaming , hackthebox Pwners , OSCP lovers to shorten their time by these useful shells☆32Mar 4, 2021Updated 4 years ago
- dns logger for passive dns collection☆42May 27, 2012Updated 13 years ago
- Simple golang reverse shell☆20Jan 22, 2020Updated 6 years ago
- ☆12Aug 1, 2022Updated 3 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 8 years ago
- Massive arsenal of hacker tools...☆79Oct 30, 2017Updated 8 years ago
- Tool for fetching all the available waybackmachine snapshot urls☆24Oct 8, 2024Updated last year
- Python implementation of the SlowLoris DoS attack.☆24Mar 19, 2017Updated 8 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- ☆37May 21, 2014Updated 11 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Dec 24, 2018Updated 7 years ago
- Python IOC Editor☆65Mar 10, 2015Updated 10 years ago
- OSINT Eye Mobile☆21Feb 1, 2025Updated last year
- Capture The Flag competition challenge write-ups☆22Jun 10, 2023Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- A Python DNS crawler to find identical domain names under different TLDs.☆25May 18, 2019Updated 6 years ago
- Docker configs and build scripts.☆22Dec 21, 2014Updated 11 years ago
- Linux/Unix Security Auditing Scripts: Lusas☆23Jun 27, 2017Updated 8 years ago
- ☆24Nov 11, 2022Updated 3 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Jun 5, 2017Updated 8 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Jun 12, 2020Updated 5 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆25Apr 1, 2023Updated 2 years ago
- Linux bash tool for Enumeration & Privilege Escalation