qeeqbox / docker-images
Kali and Parrot OS docker images accessible via VNC, RDP and Web
☆114Updated 3 years ago
Alternatives and similar repositories for docker-images:
Users that are interested in docker-images are comparing it to the libraries listed below
- Custom security distro for remote penetration testing☆52Updated 3 years ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) wit…☆85Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆45Updated 3 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆143Updated 3 years ago
- A script to build either Blackarch, Kali linux or ParrotOS Docker container which has the ability to provide desktop environment access e…☆37Updated 3 years ago
- A collection of attacks metadata that were used in my previous pen-test tools☆17Updated 2 years ago
- ☆14Updated 4 years ago
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆80Updated 4 years ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆178Updated 2 years ago
- A curated list of amazingly awesome OSINT☆83Updated 4 years ago
- Automated rogue access point setup tool.☆193Updated 3 years ago
- Scripts to set up Kali Linux with additional tools, and maintain them.☆59Updated last year
- If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "…☆19Updated 6 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆87Updated 11 months ago
- This program provides efficient web scraping services for Tor and non-Tor sites. The program has both a CLI and REST API.☆166Updated this week
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆91Updated 2 years ago
- Script to facilitate different functions and checks☆47Updated 2 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 8 months ago
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆54Updated this week
- An interactive world-map that has been used in live Cyber Threat interfaces☆12Updated 3 years ago
- Phoneinfoga Maltego Transform☆109Updated last year
- thelordseye searches and returns detailed information about devices that are directly connected to the internet [IoT] (Smart TV's, Fridge…☆63Updated last year
- Open-Source Intelligence Apparatus☆164Updated 10 months ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆54Updated last year
- ☆140Updated last year
- Useful for digital forensics investigations or initial black-box pentest footprinting.☆137Updated 3 years ago
- Complex OSINT Search Tools 🕵️♂️🔥☆162Updated 3 years ago
- ☆42Updated 3 years ago
- A tool designed to analyse email headers☆33Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Updated 5 years ago