A refresh of LazyKali which simplifies install of tools and configuration. Original author appears missing.
☆48Sep 4, 2016Updated 9 years ago
Alternatives and similar repositories for lazykali
Users that are interested in lazykali are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A binary rainfall visualizer for packet captures. Idea taken from Greg Conti's "Security Data Visualization".☆13Nov 5, 2020Updated 5 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆57Jul 5, 2019Updated 6 years ago
- An Ansible role for compiling the rtl8812au wifi driver for raspbian on the Raspberry Pi☆10Feb 9, 2020Updated 6 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆59Oct 10, 2015Updated 10 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A Docker lab integrating Splunk SIEM with Ollama LLM via MCP for AI security operations. Features Promptfoo OWASP evaluation, TA-ollama a…☆29Mar 8, 2026Updated last month
- Massive arsenal of hacker tools...☆82Oct 30, 2017Updated 8 years ago
- ☆28Jun 10, 2016Updated 9 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆38Apr 15, 2017Updated 9 years ago
- WordPress Honeypot☆35Jan 18, 2018Updated 8 years ago
- masscan result parsing, web server fingerprinting☆17Jul 24, 2022Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- Old Homepage☆12Dec 4, 2019Updated 6 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- scripts to setup pentesting system and use during pentest☆21Jun 1, 2022Updated 3 years ago
- A centralized location for all presentations I've given at various conferences☆26Sep 1, 2017Updated 8 years ago
- ☆15Jun 2, 2015Updated 10 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Chef repository for pentesting tools☆13Mar 4, 2017Updated 9 years ago
- A shell / chat bot for XMPP and cloud services☆48Oct 10, 2015Updated 10 years ago
- FLUXION☆10Jun 24, 2016Updated 9 years ago
- Networking and attacking scripts.☆10Apr 20, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 🕵️♀️ Find, locate, and query files for ops and security experts ⚡️⚡️⚡️☆36Dec 18, 2022Updated 3 years ago
- Collection of my Python Scripts☆41Aug 14, 2020Updated 5 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆118Feb 12, 2019Updated 7 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- ☆12Aug 1, 2022Updated 3 years ago
- Detect hidden files and text in images☆128May 21, 2023Updated 2 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Feb 16, 2018Updated 8 years ago
- ☆18May 16, 2013Updated 12 years ago
- python script allow red teaming , hackthebox Pwners , OSCP lovers to shorten their time by these useful shells☆33Mar 4, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ParrotSec Raspberry PI armhf image builder.☆19Jul 26, 2017Updated 8 years ago
- A curated list of websites which do not load any obtrusive 3rd party content☆11Dec 7, 2021Updated 4 years ago
- 用于内网渗透测试的工具包括 crto 认证、AD 渗透以及内网信息收集项目的自存☆18May 31, 2024Updated last year
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆28Apr 15, 2017Updated 9 years ago
- Practice Web App written in python with some vulnerabilities.☆34Mar 19, 2021Updated 5 years ago