1RaY-1 / linux-startupLinks
Make any script startup on Linux, using systemd services. I recommend to run it first in a Virtual Machine, because it's not stable yet
β11Updated 5 months ago
Alternatives and similar repositories for linux-startup
Users that are interested in linux-startup are comparing it to the libraries listed below
Sorting:
- β31Updated last year
- ππ Red Network Tool is a tool for network exploration and info finding.β40Updated 3 years ago
- Script to generate Android App to get all WhatsApp media (images, audios, videos)β16Updated 7 years ago
- Host A Hidden Service on TOR with an Onion Address !β89Updated 4 years ago
- Fast exploitation based on metasploit.β74Updated 6 years ago
- Wordlist creator written in C to generate all possibilities of passwordsβ22Updated 7 years ago
- The big-tool is for installing all hacking and security tools !β10Updated 4 years ago
- Facebook phishing pageβ10Updated 5 years ago
- Hacking Tools For All Debian-based OSβ50Updated 7 years ago
- Facebook Video Downloader (CLI) For Linux Systems Coded in PHPβ37Updated 8 years ago
- A host-based IDS and network monitoring system (My graduation project)β22Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be usβ¦β17Updated 4 years ago
- Multi facebook Cracking With Random Numbercloningβ19Updated 2 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .β45Updated 6 years ago
- Evilip Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Eβ¦β29Updated 2 years ago
- This is a satellite hack prank tool to show off and prank your friends like a real hackerβ15Updated 3 months ago
- Phishing Framework for Facebook, Gmail, Twitter, WiFi, Windows.β72Updated 5 years ago
- M-dork, google dorking with mdorkβ59Updated 7 years ago
- A single tool to bruteforce pdf , zip and hashes very super fast tool developed with python3β48Updated 2 years ago
- Evil twin tool.β36Updated 4 years ago
- Send anonymous text messages with TOR and the TextBelt APIβ67Updated 4 years ago
- About All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testersβ66Updated 5 years ago
- Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showeβ¦β44Updated 6 years ago
- A repository where i will push my webviews for some famous services like Instagram , Facebook, Twitter , Hotstar etcβ67Updated 2 years ago
- CloudFlare bypass, Breacher, FindPerson, GeneratorIPβ36Updated 2 years ago
- Clone a voice in 5 seconds to generate arbitrary speech in real-timeβ18Updated 5 years ago
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to exploit a system or server that ruβ¦β18Updated 7 years ago
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it batβ¦β49Updated 4 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardwareβ¦β46Updated 2 months ago
- Run interactive android exploits in linux.β147Updated 11 months ago