Custom security distro for remote penetration testing
☆56Mar 26, 2021Updated 5 years ago
Alternatives and similar repositories for woodpecker
Users that are interested in woodpecker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆74Nov 12, 2023Updated 2 years ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆197Oct 30, 2022Updated 3 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆130Nov 22, 2021Updated 4 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- A collection of attacks metadata that were used in my previous pen-test tools☆17Dec 23, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 4 years ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆316Apr 15, 2024Updated 2 years ago
- ☆14Dec 28, 2020Updated 5 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) wit…☆111Jul 11, 2021Updated 4 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆832Aug 8, 2023Updated 2 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆229Aug 8, 2023Updated 2 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Golang Implant & Post-Exploitation Framework☆60Jun 30, 2023Updated 2 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 3 years ago
- wifi attacks suite☆59Sep 24, 2020Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- Simple RAT in C#☆26Apr 11, 2020Updated 6 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspace☆28Jan 17, 2021Updated 5 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆13Nov 17, 2020Updated 5 years ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, ms…☆965Dec 3, 2025Updated 5 months ago
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)☆34Apr 15, 2022Updated 4 years ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…☆13Feb 18, 2024Updated 2 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 7 years ago
- Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks☆10Jan 29, 2024Updated 2 years ago
- Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)☆65Dec 16, 2020Updated 5 years ago
- A URL shortener☆19Feb 4, 2019Updated 7 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆22Oct 13, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆62May 2, 2020Updated 6 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Jul 6, 2024Updated last year
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated last month
- Discord Scripts☆12Nov 30, 2019Updated 6 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Apr 3, 2021Updated 5 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27May 13, 2024Updated last year