Custom security distro for remote penetration testing
β56Mar 26, 2021Updated 5 years ago
Alternatives and similar repositories for woodpecker
Users that are interested in woodpecker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)β48Apr 26, 2021Updated 4 years ago
- 𧬠Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)β105Apr 26, 2022Updated 3 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviorsβ74Nov 12, 2023Updated 2 years ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacksβ197Oct 30, 2022Updated 3 years ago
- Collection of exploits that were verified by an automated systemβ13Jun 17, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits β’ AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A collection of attacks metadata that were used in my previous pen-test toolsβ17Dec 23, 2022Updated 3 years ago
- Recent cyber attacks reports & interesting analysis filesβ15Apr 14, 2022Updated 4 years ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOSβ¦β313Apr 15, 2024Updated 2 years ago
- β14Dec 28, 2020Updated 5 years ago
- Pure Honeypots with an automated bash scriptβ21Sep 9, 2021Updated 4 years ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) witβ¦β109Jul 11, 2021Updated 4 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., reβ¦β18Jun 30, 2020Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfigβ10Sep 20, 2020Updated 5 years ago
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPSβ¦β830Aug 8, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)β228Aug 8, 2023Updated 2 years ago
- Vulnerability Knowledge Base comparison toolβ13Feb 9, 2022Updated 4 years ago
- Golang Implant & Post-Exploitation Frameworkβ60Jun 30, 2023Updated 2 years ago
- Tool to generate csrf payloads based on vulnerable requestsβ64Oct 9, 2020Updated 5 years ago
- Wi-Fi Exploit Toolβ50May 23, 2020Updated 5 years ago
- wifi attacks suiteβ59Sep 24, 2020Updated 5 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authenticationβ26Jan 29, 2024Updated 2 years ago
- Simple RAT in C#β27Apr 11, 2020Updated 6 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspaceβ28Jan 17, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer β’ AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- An Advanced PHP Cryptography Frameworkβ16Feb 12, 2024Updated 2 years ago
- π₯ Pentest Cheat Sheetβ36Aug 10, 2021Updated 4 years ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, msβ¦β961Dec 3, 2025Updated 4 months ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, anβ¦β13Feb 18, 2024Updated 2 years ago
- Ashok is a Osint Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration tβ¦β26May 8, 2020Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.β25May 6, 2019Updated 6 years ago
- Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacksβ11Jan 29, 2024Updated 2 years ago
- Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)β65Dec 16, 2020Updated 5 years ago
- A URL shortenerβ19Feb 4, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits β’ AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.β23Oct 13, 2020Updated 5 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibβ¦β62May 2, 2020Updated 5 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.β120Jul 6, 2024Updated last year
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect thaβ¦β16Mar 10, 2026Updated last month
- Discord Scriptsβ12Nov 30, 2019Updated 6 years ago
- IDS/IPS malware download evasionβ15Feb 21, 2019Updated 7 years ago
- MSFVenom Powershell Stager Encoder & Generatorβ15Apr 3, 2021Updated 5 years ago