lockness-Ko / wot
Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live operating system and docker image for hiding yourself by routing all your traffic through TOR
☆18Updated 2 years ago
Alternatives and similar repositories for wot:
Users that are interested in wot are comparing it to the libraries listed below
- Small python script to look for common vulnerabilities on SMTP server.☆47Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Updated 3 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Updated 3 years ago
- Yet another powerful payload encoder/decoder☆14Updated 3 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- PHP lab to test captcha bypassing☆31Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- web application pentesting tools for docker☆17Updated 2 years ago
- An automated e-mail OSINT tool☆20Updated 3 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆50Updated 3 months ago
- BAT is a tool to help everyone to securing their web-servers.☆12Updated 4 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆12Updated 2 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆13Updated 11 months ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆20Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection☆33Updated last year
- ☆12Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 9 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆18Updated 7 months ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- WebHook for Red Team☆26Updated 4 years ago
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Updated 3 years ago