samirettali / kali
Kali Linux containers for bug bounty and CTFs
☆11Updated 4 years ago
Alternatives and similar repositories for kali:
Users that are interested in kali are comparing it to the libraries listed below
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆13Updated 4 months ago
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆12Updated 2 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- Write-Ups for TryHackMe☆22Updated 3 years ago
- Just a bunch of useful scripts for netsec/admin/others☆14Updated 5 years ago
- Handy scripts and one-liners to make life easier☆37Updated 2 years ago
- ☆22Updated 4 years ago
- AWS Security Tool☆30Updated last year
- Web application pentesting recon☆23Updated 4 years ago
- Kali Linux extra useful packages for CTF and Pentest activities☆11Updated this week
- Bash script for CTF automating basic enumeration☆45Updated 3 years ago
- AppsecStudy - open-source elearning management system for information security☆9Updated last year
- A collection of wordlists to use with privilege escalation and password cracking tasks☆14Updated last year
- My bug bounty notes☆32Updated 4 years ago
- Fast dns resolver☆13Updated 11 months ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- an OSINT tool to scrape sub domains from the Virus Total API☆23Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- Perform OSINT on external targets using Shodan☆22Updated last year
- ☆14Updated 6 years ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- Intelligence gathering framework☆14Updated 9 years ago
- A Python based scanner uses shodan-internetdb to scan the IP.☆31Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 9 months ago
- Caido's passive workflow to find potential leaked secrets, PII, and sensitive fields.☆17Updated 3 months ago
- Jumpstart multiple WebSocket servers quickly☆31Updated 3 years ago
- ☆11Updated this week
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago