Athena-OS / athena-docs
🌟 Beautiful, high-performance Athena OS documentation
☆10Updated last week
Related projects: ⓘ
- ☆19Updated 6 months ago
- Official Athena OS docker base images.☆10Updated 3 months ago
- i3 rice Inspired by Cyberpunk 2077☆27Updated 2 years ago
- Play Hack The Box directly on your system.☆37Updated last week
- Exodia Wireless Editions src ISO for Wireless Pentesting☆17Updated 3 weeks ago
- Athena OS Nix configuration files focused on Cybersecurity. Learn, practice and enjoy with any hacking tool!☆116Updated last week
- Official BlackArch Linux docker images.☆21Updated last month
- Automated solution for nmap'ing☆21Updated last year
- Summon Demon Linux☆36Updated 3 months ago
- it's a script that generates a gnome wallpaper with the pc processes in a word cloud that looks like a picture.☆26Updated 4 months ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆12Updated 2 years ago
- ☆66Updated this week
- Automatic reverse/bind shell generator cheat sheet.☆35Updated last year
- ☆14Updated last year
- An automated scanning, enumeration, and note taking tool for pentesters☆12Updated 2 years ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆59Updated 6 months ago
- A terminal plugin to make Kali Linux objectively better - compatible with ohmyzsh☆11Updated 7 months ago
- Pull Hashes Decryption From Online Sources Using Python☆15Updated 2 months ago
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆12Updated last year
- 🤖 The Modern Port Scanner 🤖☆13Updated 3 years ago
- My own blog about pentesting and more☆12Updated 7 months ago
- DNSrecon tool with GUI for Kali Linux☆55Updated last year
- The swiss army knife for cybersecurity enthusiasts. All needed scripts and tools integrated into one portable and customizable CLI.☆41Updated 5 months ago
- ☆23Updated this week
- Upgrade kali linux default installation☆13Updated last week
- Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is abl…☆17Updated 4 years ago
- Bypassing File Upload Restriction using Magic Bytes☆12Updated 2 years ago
- SSG SIEM Tool☆14Updated 8 months ago
- ☆82Updated 4 months ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆22Updated last year