Run Kali Linux in a Docker Container
☆156Apr 16, 2023Updated 2 years ago
Alternatives and similar repositories for kali-linux-docker
Users that are interested in kali-linux-docker are comparing it to the libraries listed below
Sorting:
- Configure kali 2020.4 headless/headed for RPi4b☆15Jan 28, 2021Updated 5 years ago
- A collection of scripts designed to secure/harden Linux based distributions☆12Nov 2, 2025Updated 4 months ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 12, 2019Updated 6 years ago
- Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers every…☆36Jan 6, 2025Updated last year
- Recon Automation☆11Sep 14, 2024Updated last year
- POC for a basic C2 server using the python aiohttp framework☆15Mar 22, 2020Updated 5 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- Kali Linux advanced setup☆139Feb 28, 2026Updated last week
- POC FortiOS SSL-VPN buffer overflow vulnerability☆27Jun 16, 2023Updated 2 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- R Ultimate 2023 - R for Data Science and Machine Learning, by Packt Publishing☆15Dec 15, 2025Updated 2 months ago
- Cisco IOS Security Inspector☆39Dec 29, 2025Updated 2 months ago
- SSH Reverse Tunnels with Login Notifications via Telegram Bot☆31Feb 22, 2023Updated 3 years ago
- ☆33Jan 3, 2023Updated 3 years ago
- ODSC 2023 workshop materials on causal graphs using implementations of DoWhy (PyWhy, EconML)☆13Nov 1, 2023Updated 2 years ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆15Dec 18, 2021Updated 4 years ago
- Kali Linux Fixes for Newly Imported VM's☆2,396Jun 30, 2025Updated 8 months ago
- Laravel RCE Exploitation Toolkit☆57Nov 8, 2025Updated 4 months ago
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago
- KALI LINUX : WINDOWS SUBSYSTEM FOR LINUX☆76Aug 31, 2023Updated 2 years ago
- Machine Learning-based tool for Cybersecurity Risk Assessment☆11Jul 18, 2021Updated 4 years ago
- A database and collection of hack and translation files☆12Jun 28, 2019Updated 6 years ago
- Next-Gen Data Classification and Encryption☆15Jan 29, 2025Updated last year
- ☆14Jul 26, 2017Updated 8 years ago
- Machine learning based credit risk prediction system☆27Nov 18, 2025Updated 3 months ago
- ☆10Nov 2, 2025Updated 4 months ago
- PHP DDoS/Stress Test☆11Feb 7, 2026Updated last month
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- An minimalistic, interactive Portfolio Template☆10Jan 28, 2021Updated 5 years ago
- Threat Modelling Assets (STRIDE, DREAD, etc. cheat sheets)☆13Apr 16, 2020Updated 5 years ago
- ☆11Jun 9, 2023Updated 2 years ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- Java Web shell project☆12Oct 22, 2021Updated 4 years ago
- R Data Mining, published by Packt☆13Jan 30, 2023Updated 3 years ago
- Manage objects inside a cdn☆19Mar 1, 2026Updated last week
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- This repository contains an implementation for design patterns detection. In this task, feature engineering and ensemble learning are app…☆10Jul 30, 2022Updated 3 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- ☆14Jun 13, 2022Updated 3 years ago