qeeqbox / woodpeckerLinks
Custom security distro for remote penetration testing
☆53Updated 4 years ago
Alternatives and similar repositories for woodpecker
Users that are interested in woodpecker are comparing it to the libraries listed below
Sorting:
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- ☆14Updated 4 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆71Updated last year
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- ☆33Updated 5 months ago
- ☆52Updated 4 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆61Updated 4 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆56Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Updated 6 years ago
- A curated list of awesome threat detection and hunting resources☆18Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Updated 6 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Maltego integration of https://clearbit.com☆39Updated 4 years ago
- A collection of attacks metadata that were used in my previous pen-test tools☆17Updated 2 years ago
- A database for storing, querying and doing stats on credential leaks☆39Updated 2 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆22Updated 3 years ago
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆91Updated last year
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆38Updated last year
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 11 months ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 6 years ago
- BAT is a tool to help everyone to securing their web-servers.☆12Updated 4 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆61Updated 4 years ago
- Scripts related to offensiveosint.io☆23Updated 5 years ago
- ☆24Updated 5 years ago
- Scans Onion sites for keywords and if found, will send an email alert to designated email address. Ideal for individuals or companies who…☆29Updated 4 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year