The goal of this program is to quickly pull and install repos from its list
☆40Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for RapidRepoPull
Users that are interested in RapidRepoPull are comparing it to the libraries listed below
Sorting:
- A defense tool - detect web shells in local directories via md5sum☆32Jul 18, 2019Updated 6 years ago
- Extra packages for Termux (android terminal emulator)☆28Dec 23, 2018Updated 7 years ago
- Open source all-in-one CLI tool to semi-automate pentesting.☆165May 21, 2020Updated 5 years ago
- An OSINT Metadata analyzing tool that filters through tags and creates reports☆119Mar 18, 2019Updated 6 years ago
- ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )☆243Feb 6, 2021Updated 5 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Mar 14, 2018Updated 7 years ago
- ☆29Jul 4, 2020Updated 5 years ago
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- ☆17Apr 13, 2018Updated 7 years ago
- Automation examples for deploying VMware Appliance for Folding @ Home (https://flings.vmware.com/vmware-appliance-for-folding-home)☆15Apr 1, 2020Updated 5 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- This tool helps you pentest THE PAST of a website.☆15Jul 13, 2025Updated 7 months ago
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆247Nov 17, 2019Updated 6 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆123Apr 13, 2019Updated 6 years ago
- Malware/IOC ingestion and processing engine☆109Nov 20, 2018Updated 7 years ago
- visually see issues with supported cipher suites☆17Jun 18, 2024Updated last year
- A mass communicator module for the WiFi Pineapple that utilizes TLS to control a botnet of compromised systems.☆15Jul 18, 2020Updated 5 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- Mobile Pentest related stuff☆14Jun 14, 2017Updated 8 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- CmdRunner is a modular command encoder used to easily encode data run through various systems and commands. It's primary use is to run co…☆16Jun 10, 2019Updated 6 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- small python3 tool to check common vulnerabilities in SMTP servers☆162Apr 21, 2023Updated 2 years ago
- FirePrint is a security tool for finding misconfigured Firebase realtime databases in Android or iOS applications.☆22Apr 4, 2024Updated last year
- Installing Kali linux on Vps Server☆116Aug 21, 2019Updated 6 years ago
- Collect information about email addresses from Pastebin☆39Jun 1, 2021Updated 4 years ago
- ☆17Mar 21, 2019Updated 6 years ago
- dnssinkholelist is a python package focused on combining open source lists of malicious domains, dynamic dns domains, and advertisement d…☆18Apr 13, 2016Updated 9 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- This tool will scan all the URL's in the file and will provide Content-Length, Status-Code, Server and more.☆36Dec 22, 2021Updated 4 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Jan 16, 2020Updated 6 years ago
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors☆282Oct 2, 2020Updated 5 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Feb 23, 2017Updated 9 years ago