InfoSecWarrior / Kali-Linux-Configuration
Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers everything from repository setup and NVIDIA driver installation to Python configuration and essential tool installation, ensuring an optimized setup for penetration testing tasks.
☆22Updated 4 months ago
Alternatives and similar repositories for Kali-Linux-Configuration:
Users that are interested in Kali-Linux-Configuration are comparing it to the libraries listed below
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆22Updated 4 years ago
- Burp or Burp Suite is a set of tools used for penetration testing of web applications. It is developed by the company named Portswigger.☆18Updated 4 months ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆39Updated 8 months ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- An Effiecent Tool To Change Tor IP's in Seconds,change mac address and clean all logs☆37Updated 3 years ago
- This is a simple web application vulnerability scanner that checks if a given URL or IP address is vulnerable to 36 common web applicatio…☆23Updated last week
- Upgrade kali linux default installation☆14Updated 3 weeks ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆23Updated 3 years ago
- Who We Are☆19Updated 8 months ago
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆23Updated 6 months ago
- A tool for WI-FI penetration testing that automates your attacking processes.☆30Updated 2 months ago
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆43Updated 8 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆44Updated 9 months ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆20Updated 2 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆15Updated last year
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆34Updated 4 years ago
- crawl a website for links and expose all the vulnerable parameters.☆12Updated 2 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated 2 years ago
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The …☆40Updated 3 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆25Updated 2 years ago
- A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.☆17Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆17Updated 2 years ago
- Subdomain Bruteforce - Bounty Quick Code☆30Updated 8 months ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆13Updated 5 months ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆40Updated 2 years ago
- Nmap & SQL injection automation tool☆34Updated 6 months ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆51Updated 2 years ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆46Updated last year
- Collection of extra pentest tools for Kali Linux☆104Updated last year