Kali Mirrorscript-v2 automatically select the best kali mirror server and apply the configuration
☆85Mar 3, 2024Updated 2 years ago
Alternatives and similar repositories for mirrorscript-v2
Users that are interested in mirrorscript-v2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bash script to crack rdp with THC-Hydra☆19Oct 22, 2021Updated 4 years ago
- .Net library to create Maltego transformations.☆17Feb 11, 2025Updated last year
- ☆13Jan 28, 2019Updated 7 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆12Oct 27, 2021Updated 4 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- Recursive Credit Card Searcher For Windows C++ and Linux☆12Oct 26, 2021Updated 4 years ago
- Investigation of the core VPN technologies | Penetration testing of an IPsec-VPN (using Ike-scan and psk-crack) | MitM Attack on PPTP-VPN…☆16May 15, 2016Updated 9 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆12Sep 19, 2023Updated 2 years ago
- Metasploit Framework☆11Apr 18, 2019Updated 6 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and reroutin…☆10Dec 23, 2014Updated 11 years ago
- New Honeypot Version: 1.2! This pH7CMS module is a simple but effective honeypot fake Admin CP for the security of your website. Honey…☆12Aug 3, 2018Updated 7 years ago
- XploitSPY is an Android Monitoring / Spying Tool☆26Apr 9, 2020Updated 5 years ago
- Mikrotik Billing System Generate Voucher Hotspot PHP☆18Feb 22, 2022Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Apr 5, 2019Updated 6 years ago
- Sample apps taken from Windows Server 2003 and running in Docker Windows containers☆16Aug 24, 2018Updated 7 years ago
- ☆16Oct 15, 2022Updated 3 years ago
- Finds internet-exposed resources in an AWS account☆18Sep 1, 2024Updated last year
- Concurrently test bing results for shellshock vulnerability☆42Sep 27, 2014Updated 11 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- Bootimage ADB Unsecure / Secure Patcher for Android devices☆36May 11, 2018Updated 7 years ago
- Fork of rsakeyfind☆20Aug 27, 2017Updated 8 years ago
- [Moved to https://github.com/standardnotes/app] A code editor for Standard Notes with syntax highlighting support for over 120 programmin…☆13Apr 29, 2022Updated 3 years ago
- ☆19Apr 29, 2015Updated 10 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- E-mails, subdomains and names Harvester - OSINT☆13Feb 26, 2018Updated 8 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Feb 27, 2018Updated 8 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Aug 31, 2023Updated 2 years ago
- A Docker image for bits of Kali Linux☆31Mar 25, 2023Updated 2 years ago
- XSS Fuzz Swiss Knife on any URI☆15Aug 3, 2019Updated 6 years ago
- Bug Hunting Penetration RGB Hat are red, gray, and black hat☆19Jan 21, 2026Updated 2 months ago
- ProtonVPN's related scripts and static contents.☆26Mar 24, 2018Updated 7 years ago
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- Hardware design files for the PMOD based MUX☆13Aug 22, 2019Updated 6 years ago
- Mirror of http://rafale.org/~mattoufoutu/darkc0de.com☆13Jul 25, 2015Updated 10 years ago
- youtube dork queries for default file names☆14Nov 3, 2021Updated 4 years ago
- Create a http server in your pc to access files from any other devices under same Wi-Fi!☆19Mar 18, 2024Updated 2 years ago
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆35Nov 7, 2025Updated 4 months ago
- A Pictorial Book of Tor Hidden Services.☆26Dec 1, 2017Updated 8 years ago
- Your one-stop shop for everything you need to know during #Hack weekend.☆11May 31, 2019Updated 6 years ago