qeeqbox / woodpeckerView external linksLinks
Custom security distro for remote penetration testing
β55Mar 26, 2021Updated 4 years ago
Alternatives and similar repositories for woodpecker
Users that are interested in woodpecker are comparing it to the libraries listed below
Sorting:
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)β47Apr 26, 2021Updated 4 years ago
- 𧬠Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)β103Apr 26, 2022Updated 3 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviorsβ73Nov 12, 2023Updated 2 years ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacksβ193Oct 30, 2022Updated 3 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Webβ126Nov 22, 2021Updated 4 years ago
- Collection of exploits that were verified by an automated systemβ13Jun 17, 2021Updated 4 years ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOSβ¦β308Apr 15, 2024Updated last year
- β14Dec 28, 2020Updated 5 years ago
- Recent cyber attacks reports & interesting analysis filesβ15Apr 14, 2022Updated 3 years ago
- A collection of attacks metadata that were used in my previous pen-test toolsβ17Dec 23, 2022Updated 3 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., reβ¦β18Jun 30, 2020Updated 5 years ago
- Pure Honeypots with an automated bash scriptβ21Sep 9, 2021Updated 4 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfigβ10Sep 20, 2020Updated 5 years ago
- Vulnerability Knowledge Base comparison toolβ13Feb 9, 2022Updated 4 years ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) witβ¦β105Jul 11, 2021Updated 4 years ago
- Wi-Fi Exploit Toolβ51May 23, 2020Updated 5 years ago
- Tool to generate csrf payloads based on vulnerable requestsβ64Oct 9, 2020Updated 5 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspaceβ28Jan 17, 2021Updated 5 years ago
- wifi attacks suiteβ59Sep 24, 2020Updated 5 years ago
- Golang Implant & Post-Exploitation Frameworkβ60Jun 30, 2023Updated 2 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)β212Aug 8, 2023Updated 2 years ago
- Simple RAT in C#β27Apr 11, 2020Updated 5 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.β15Apr 13, 2023Updated 2 years ago
- A URL shortenerβ19Feb 4, 2019Updated 7 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.β23Oct 13, 2020Updated 5 years ago
- Discord Scriptsβ12Nov 30, 2019Updated 6 years ago
- YARA rule-based automation system to detect network attacks at byte-levelβ13May 12, 2021Updated 4 years ago
- An Advanced PHP Cryptography Frameworkβ16Feb 12, 2024Updated 2 years ago
- π₯ Pentest Cheat Sheetβ36Aug 10, 2021Updated 4 years ago
- A python command line reverse geocoding location request and response tool based on the coordinates of cell phone towers pinged by a userβ¦β23Oct 29, 2020Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.β27Dec 29, 2021Updated 4 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibβ¦β64May 2, 2020Updated 5 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.β19Jan 13, 2022Updated 4 years ago
- Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)β65Dec 16, 2020Updated 5 years ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)β13Jan 12, 2025Updated last year
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent onβ¦β11Aug 26, 2014Updated 11 years ago
- pour plus de tutos veuillez visiter le siteβ11Sep 21, 2020Updated 5 years ago
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befoβ¦β14Aug 31, 2021Updated 4 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementationβ12Apr 21, 2022Updated 3 years ago