An ArchLinux based distribution for penetration testers and security researchers.
☆3,336Apr 29, 2026Updated this week
Alternatives and similar repositories for blackarch
Users that are interested in blackarch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BlackArch Linux ISOs☆273Apr 21, 2026Updated 2 weeks ago
- BlackArch Linux Guide for Users and Developers☆177Aug 3, 2025Updated 9 months ago
- The official BlackArch Linux installer☆130Mar 29, 2025Updated last year
- An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and A…☆525May 21, 2024Updated last year
- BlackArch Linux website☆141Apr 21, 2026Updated 2 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Emerge for Blackarch - Download and compile packages as Emerge does☆70Mar 15, 2024Updated 2 years ago
- Official BlackArch Linux PKGBUILD templates.☆33Mar 31, 2026Updated last month
- Artwork for BlackArch Linux. We accept art contributions!☆72Jun 27, 2021Updated 4 years ago
- BlackArch menu, theme, and config for i3 WM.☆40Sep 6, 2023Updated 2 years ago
- Metasploit Framework☆38,066Updated this week
- Fetch, install and search exploit archives from exploit sites.☆118Oct 10, 2023Updated 2 years ago
- Images and scripts for virtualization☆41Oct 27, 2021Updated 4 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,860Nov 10, 2022Updated 3 years ago
- Various webshells. We accept pull requests for additions to this collection.☆1,022Oct 4, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,511Sep 22, 2024Updated last year
- CTF framework and exploit development library☆13,412Updated this week
- Empire is a PowerShell and Python post-exploitation agent.☆7,831Jan 19, 2020Updated 6 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆532Apr 17, 2024Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,646Updated this week
- A little tool to play with Windows security☆21,486Apr 17, 2026Updated 2 weeks ago
- BlackArch Linux Keyring☆27Oct 11, 2025Updated 6 months ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,538Feb 13, 2025Updated last year
- Automatically install all Kali linux tools☆5,227Apr 29, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Exploitation Framework for Embedded Devices☆13,097Mar 2, 2026Updated 2 months ago
- UNIX-like reverse engineering framework and command-line toolset☆23,561Updated this week
- A swiss army knife for pentesting networks☆9,126Dec 6, 2023Updated 2 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆12,824Updated this week
- A collection of awesome penetration testing resources, tools and other shiny things☆26,033Jan 25, 2026Updated 3 months ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,975Mar 22, 2024Updated 2 years ago
- The Kali NetHunter Project☆3,763Apr 25, 2019Updated 7 years ago
- Attack Surface Management Platform☆9,715Feb 15, 2026Updated 2 months ago
- Gentoo overlay for security tools as well as the heart of the Pentoo Livecd☆372Apr 22, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,442Apr 22, 2026Updated 2 weeks ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆19,149Apr 18, 2026Updated 2 weeks ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,828Oct 21, 2024Updated last year
- In-depth attack surface mapping and asset discovery☆14,484Apr 17, 2026Updated 2 weeks ago
- E-mails, subdomains and names Harvester - OSINT☆16,127Updated this week
- Ghidra is a software reverse engineering (SRE) framework☆67,996Updated this week
- Automatic SQL injection and database takeover tool☆37,167Apr 24, 2026Updated last week