stevemcilwain / Disposable-KaliLinks
Vagrant file and scripting for easy, disposable Kali Linux virtualization
☆21Updated 5 years ago
Alternatives and similar repositories for Disposable-Kali
Users that are interested in Disposable-Kali are comparing it to the libraries listed below
Sorting:
- Import Nmap scans to Cherrytree☆37Updated 3 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- My pentest cheat sheet☆15Updated 8 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆70Updated 2 years ago
- Script to automate, manage, and multithread Nikto scans.☆61Updated 5 years ago
- ☆32Updated 6 years ago
- Comprehensive parsing script for grepable Nmap output files. Provides a summary table, split hosts files, and URLs for web and SMB hosts.☆20Updated 5 years ago
- Automation scripts in preparation for PWK/OSCP labs☆17Updated 4 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago
- A parser to extract information from .nessus file format☆23Updated 4 years ago
- API testing tool written with Python☆56Updated 8 years ago
- another nmap summarising script☆26Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆99Updated 5 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 6 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- pentest scripts☆21Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 5 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆13Updated 4 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆39Updated 5 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- CherryTree OSCP methodology template☆15Updated 6 years ago
- automatic scan for hackthebox☆13Updated 5 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Clean public password dump files and store in ELK☆38Updated 7 years ago