Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.
☆60Dec 21, 2020Updated 5 years ago
Alternatives and similar repositories for P-SAK
Users that are interested in P-SAK are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- Sample list of penetration test reports☆18Dec 12, 2016Updated 9 years ago
- Burp scanner plugin based on Vulners.com vulnerability database☆25Jul 10, 2017Updated 8 years ago
- Package manager for hackers built by hackers☆37Aug 31, 2018Updated 7 years ago
- Unixy security tools for reporting and alerting about security information and events☆15May 8, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Mac and hostname random changer☆43Oct 12, 2017Updated 8 years ago
- ☆12Feb 16, 2012Updated 14 years ago
- This is a burp plugin that extracts keywords from response using regexes and test for reflected XSS on the target scope.☆75Nov 5, 2020Updated 5 years ago
- Framework for Telegram users and chats investigating☆74May 14, 2026Updated last week
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Apr 3, 2024Updated 2 years ago
- OSINT-SAN Framework дает возможность быстро находить информацию и деанонимизировать пользователей сети интернет.☆602Mar 19, 2026Updated 2 months ago
- 🌵 Command and Action routine Server☆16Updated this week
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated 4 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Bramble is a hacking Open source suite.☆84Jan 21, 2020Updated 6 years ago
- ☆11Oct 17, 2025Updated 7 months ago
- Simple checker for ok.ru partial private data disclosure☆13Oct 5, 2023Updated 2 years ago
- SSH Reverse Tunnels with Login Notifications via Telegram Bot☆31Feb 22, 2023Updated 3 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆31Jun 19, 2022Updated 3 years ago
- A tool combined with the advantages of masscan and nmap☆60Dec 7, 2021Updated 4 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆146Sep 4, 2021Updated 4 years ago
- An online handy-recon tool☆259Nov 12, 2023Updated 2 years ago
- CISCO CVE-2020-3452 Scanner & Exploiter☆99Jul 29, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆10Aug 28, 2020Updated 5 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Updated this week
- ☆18Mar 23, 2021Updated 5 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- A list of web application security☆92Sep 11, 2019Updated 6 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆54Oct 1, 2020Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- Daily alert when a new domain name is registered and contains your keywords☆120Oct 23, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- recursos en español para profes con conciencia digital☆11Oct 14, 2018Updated 7 years ago
- Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.☆333Nov 21, 2020Updated 5 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆534Mar 27, 2022Updated 4 years ago
- Quick OSINT checks for IPs and Domains during triage and investigations.☆31Apr 14, 2026Updated last month
- Tools for unpacking and repacking Boot.img. Nicely packaged for easy compilation!☆32Jul 27, 2013Updated 12 years ago
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated 2 years ago
- Deploy your own lab of web application penetration testing with docker and docker-compose, webgoat, dvwap, bwapp and Juice Shop☆74Aug 20, 2021Updated 4 years ago