lockness-Ko / wot
Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live operating system and docker image for hiding yourself by routing all your traffic through TOR
☆18Updated 2 years ago
Alternatives and similar repositories for wot:
Users that are interested in wot are comparing it to the libraries listed below
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆47Updated last year
- PHP lab to test captcha bypassing☆31Updated last year
- ☆17Updated last year
- web application pentesting tools for docker☆17Updated 2 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆13Updated 11 months ago
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Updated 3 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆12Updated 2 years ago
- An automated e-mail OSINT tool☆20Updated 2 years ago
- A tool for steganography of png files .☆23Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 11 months ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆39Updated last year
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Updated 3 years ago
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆19Updated 2 years ago
- GhostSec Scam Detection Tool☆15Updated 4 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆17Updated last year
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Payloads and Lists☆20Updated 5 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- WebHook for Red Team☆26Updated 4 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- ADDS (Active Directory Domain Services)☆26Updated last year
- ☆9Updated 3 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- Ded Security Framework is a tool aimed at security professionals☆34Updated 10 months ago