stevenaldinger / deckerLinks
Declarative penetration testing orchestration framework
☆293Updated 5 years ago
Alternatives and similar repositories for decker
Users that are interested in decker are comparing it to the libraries listed below
Sorting:
- Goca Scanner☆328Updated 2 years ago
- Go Web Application Penetration Test☆347Updated last year
- An XSS reverse shell framework☆310Updated 7 years ago
- a CLI for ephemeral penetration testing☆15Updated 6 years ago
- A simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams/Lark/Telegram & Pushover support☆300Updated 3 weeks ago
- Yar is a tool for plunderin' organizations, users and/or repositories.☆239Updated 4 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆112Updated 5 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆168Updated 5 years ago
- blacksheepwall is a hostname reconnaissance tool☆302Updated 5 years ago
- an asynchronous target enumeration tool☆245Updated 3 years ago
- A collection of useful Serverless functions I use when pentesting☆391Updated 3 years ago
- Hawkeye filesystem analysis tool☆241Updated 7 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆480Updated 7 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆74Updated 2 years ago
- An Ansible playbook to provision a host for penetration testing and CTF challenges☆231Updated 4 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆182Updated 3 years ago
- A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform☆166Updated last year
- Respounder detects presence of responder in the network.☆320Updated 6 years ago
- nextnet is a pivot point discovery tool written in Go.☆452Updated 4 months ago
- Open source offensive security platform for red team, by red team.☆386Updated 8 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆350Updated 5 years ago
- A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆87Updated 8 months ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆164Updated 6 years ago
- A powerful target reconnaissance framework powered by graph theory.☆418Updated 3 years ago
- Elasticsearch for Offensive Security☆141Updated 5 years ago
- Python automation of Docker.sock abuse☆211Updated 3 years ago
- Github for the scripts utilised during Penetration test☆235Updated 8 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆294Updated 6 years ago
- A testing framework for mail security and filtering solutions.☆245Updated 2 years ago
- A Go library containing a set of opinionated packages, objects, helpers and functions implemented with the KISS principle in mind.☆162Updated 2 years ago