Offensive tools as Dockerfiles. Lightweight & Ready to go
☆207Nov 16, 2018Updated 7 years ago
Alternatives and similar repositories for Offensive-Dockerfiles
Users that are interested in Offensive-Dockerfiles are comparing it to the libraries listed below
Sorting:
- Find open databases - Powered by Binaryedge.io☆14Jan 4, 2020Updated 6 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- GZip HTTP Bombing in Python for everyone☆43Oct 18, 2017Updated 8 years ago
- Automated Red Team Infrastructure deployement using Docker☆1,261Aug 24, 2022Updated 3 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆156Jan 21, 2020Updated 6 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- A pattern for a self-installing Windows service in C# with the unstoppable attributes in C#.☆67Jan 19, 2019Updated 7 years ago
- An automatic SQL Injection tool which takes advantage of ~DorkNet~ Googler, Ddgr, WhatWaf and sqlmap.☆272Apr 16, 2021Updated 4 years ago
- ☆22Aug 28, 2023Updated 2 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆23Jan 20, 2018Updated 8 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- ☆11Mar 2, 2019Updated 7 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆532Mar 7, 2022Updated 3 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- Port of eternal blue exploits to powershell☆151Jun 3, 2017Updated 8 years ago
- Elite is the client-side component of the Covenant project. Covenant is a .NET command and control framework that aims to highlight the a…☆124Jul 7, 2023Updated 2 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- Pull A List Of 1000 Most Popular Containers On Docker Hub☆15Aug 11, 2020Updated 5 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Selenium powered Python script to automate searching for vulnerable web apps.☆350Feb 20, 2022Updated 4 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆116Mar 29, 2019Updated 6 years ago
- Advanced reconnaissance utility☆994Nov 20, 2023Updated 2 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆535Aug 1, 2018Updated 7 years ago
- Tool for password spraying RDP☆98Oct 12, 2018Updated 7 years ago
- Vulnerability scanner based on vulners.com audit API☆65Jul 25, 2018Updated 7 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆69Mar 11, 2018Updated 7 years ago
- A framework for stealthy domain reconnaissance☆301Oct 14, 2021Updated 4 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago