Loading...

An image with commonly used tools for creating a pentest environment easily and quickly, with detailed instructions for launching in a VPS.

An image with commonly used tools for creating a pentest environment easily and quickly, with detailed instructions for launching in a VPS.
Offensive Docker is an image with the most commonly used tools for creating a pentest environment easily and quickly. It includes a variety of tools for port scanning, recon, subdomain takeover, DNS lookups, screenshot, crawling, directory search, fuzzing, web scanning, CMS search, JS analysis, wordlists, Git repository scanning, mobile testing, brute force, cracking, OS enumeration, exploits, Windows reverse shell, forensic analysis, custom functions, reporting tools, and more. It also provides detailed instructions on how to launch it in a VPS on Google Cloud Platform or Digital Ocean.
Common questions about Offensive Docker including features, pricing, alternatives, and user reviews.
Offensive Docker is An image with commonly used tools for creating a pentest environment easily and quickly, with detailed instructions for launching in a VPS. It is a Vulnerability Management solution designed to help security teams with Port Scanning, Fuzzing, Brute Force.
SecLists is a comprehensive repository of security testing lists including usernames, passwords, URLs, fuzzing payloads, and web shells used during penetration testing and security assessments.
A brute force parameter discovery tool for identifying hidden GET and POST parameters in web applications during security assessments.
An AI-powered wrapper for ffuf that automatically suggests relevant file extensions for web fuzzing based on target URL analysis and response headers.
Automated fuzz & penetration testing tool for automotive ECUs and software.
BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.