lockness-Ko / wot
Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live operating system and docker image for hiding yourself by routing all your traffic through TOR
☆18Updated 2 years ago
Alternatives and similar repositories for wot
Users that are interested in wot are comparing it to the libraries listed below
Sorting:
- web application pentesting tools for docker☆17Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆50Updated 3 months ago
- BAT is a tool to help everyone to securing their web-servers.☆12Updated 4 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- PHP lab to test captcha bypassing☆31Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- A tool for steganography of png files .☆23Updated 2 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆12Updated 2 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Updated 3 years ago
- Deepsearch leak database client, as an alternative for pwndb☆15Updated 2 years ago
- Ransomware for demonstration☆15Updated 2 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 3 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆11Updated 4 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- ADDS (Active Directory Domain Services)☆26Updated 2 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆13Updated last year
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆20Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22Updated 2 months ago
- Small python script to look for common vulnerabilities on SMTP server.☆47Updated last year
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated 9 months ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago