Custom security distro for remote penetration testing
β56Mar 26, 2021Updated 5 years ago
Alternatives and similar repositories for woodpecker
Users that are interested in woodpecker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)β48Apr 26, 2021Updated 4 years ago
- 𧬠Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)β105Apr 26, 2022Updated 3 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviorsβ74Nov 12, 2023Updated 2 years ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacksβ196Oct 30, 2022Updated 3 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Webβ129Nov 22, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Collection of exploits that were verified by an automated systemβ13Jun 17, 2021Updated 4 years ago
- A collection of attacks metadata that were used in my previous pen-test toolsβ17Dec 23, 2022Updated 3 years ago
- Recent cyber attacks reports & interesting analysis filesβ15Apr 14, 2022Updated 3 years ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOSβ¦β312Apr 15, 2024Updated last year
- β14Dec 28, 2020Updated 5 years ago
- Pure Honeypots with an automated bash scriptβ21Sep 9, 2021Updated 4 years ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) witβ¦β110Jul 11, 2021Updated 4 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., reβ¦β18Jun 30, 2020Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfigβ10Sep 20, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)β226Aug 8, 2023Updated 2 years ago
- Vulnerability Knowledge Base comparison toolβ13Feb 9, 2022Updated 4 years ago
- Golang Implant & Post-Exploitation Frameworkβ60Jun 30, 2023Updated 2 years ago
- Tool to generate csrf payloads based on vulnerable requestsβ64Oct 9, 2020Updated 5 years ago
- Wi-Fi Exploit Toolβ50May 23, 2020Updated 5 years ago
- wifi attacks suiteβ59Sep 24, 2020Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.β27Dec 29, 2021Updated 4 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authenticationβ25Jan 29, 2024Updated 2 years ago
- Simple RAT in C#β27Apr 11, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspaceβ28Jan 17, 2021Updated 5 years ago
- An Advanced PHP Cryptography Frameworkβ16Feb 12, 2024Updated 2 years ago
- π₯ Pentest Cheat Sheetβ36Aug 10, 2021Updated 4 years ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, msβ¦β957Dec 3, 2025Updated 3 months ago
- Post-Auth RCE & Persistence on UOKOO Security Camerasβ13Nov 17, 2020Updated 5 years ago
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)β34Apr 15, 2022Updated 3 years ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, anβ¦β13Feb 18, 2024Updated 2 years ago
- Ashok is a Osint Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration tβ¦β26May 8, 2020Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.β25May 6, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacksβ11Jan 29, 2024Updated 2 years ago
- Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)β65Dec 16, 2020Updated 5 years ago
- A URL shortenerβ19Feb 4, 2019Updated 7 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.β23Oct 13, 2020Updated 5 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibβ¦β64May 2, 2020Updated 5 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.β120Jul 6, 2024Updated last year
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect thaβ¦β16Mar 10, 2026Updated 2 weeks ago