Open source tool to help you build a valid SSL certificate chain.
☆377Nov 19, 2024Updated last year
Alternatives and similar repositories for mkchain
Users that are interested in mkchain are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Wipe, reinstall or restore your system from running GNU/Linux distribution. Via SSH, without rebooting.☆281Nov 19, 2024Updated last year
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆508Nov 19, 2024Updated last year
- OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).☆156Nov 15, 2019Updated 6 years ago
- Iptables Essentials: Common Firewall Rules and Commands.☆1,576Nov 19, 2024Updated last year
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,821Nov 19, 2024Updated last year
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- Create multiple TOR instances with a load-balancing.☆1,142Nov 19, 2024Updated last year
- My simple Swiss Army knife for http/https troubleshooting and profiling.☆3,851Nov 19, 2024Updated last year
- Collection of IT whitepapers, presentations, pdfs; hacking, web app security, db, reverse engineering and more; EN/PL.☆536Dec 1, 2019Updated 6 years ago
- Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.☆217Oct 23, 2019Updated 6 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆213Mar 27, 2022Updated 3 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 7 years ago
- A command-line network packet crafting and injection utility☆521Sep 29, 2023Updated 2 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Nov 23, 2016Updated 9 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆535Aug 1, 2018Updated 7 years ago
- Powershell-based Windows Security Auditing Toolbox☆574Jan 9, 2019Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Nov 27, 2018Updated 7 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Feb 2, 2023Updated 3 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆418Aug 10, 2023Updated 2 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- A webshell framework for penetration testers.☆300Aug 10, 2025Updated 7 months ago
- Script to automate PUT HTTP method exploitation to get shell☆125Jun 25, 2020Updated 5 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Jun 19, 2018Updated 7 years ago
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆1,619Nov 19, 2024Updated last year
- Powershell script to setup windows port forwarding using native netsh client☆124Aug 6, 2018Updated 7 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Apr 15, 2019Updated 6 years ago
- Script to steal passwords from ssh.☆489Dec 19, 2018Updated 7 years ago
- SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆2,986Jun 28, 2024Updated last year
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Jan 25, 2018Updated 8 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago