Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers everything from repository setup and NVIDIA driver installation to Python configuration and essential tool installation, ensuring an optimized setup for penetration testing tasks.
☆37Jan 6, 2025Updated last year
Alternatives and similar repositories for Kali-Linux-Configuration
Users that are interested in Kali-Linux-Configuration are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆101Oct 13, 2025Updated 6 months ago
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆99Sep 27, 2025Updated 7 months ago
- This software allows you to perform a deauth attack with an ESP8266 against selected networks. The ESP8266 is a cheap and easy to use Wi-…☆10Sep 28, 2023Updated 2 years ago
- i3 for kali-linux 1 shot setup configs included☆11Sep 1, 2023Updated 2 years ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆22May 23, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆32May 19, 2022Updated 3 years ago
- Advanced SQLMap command builder with an intuitive cheatsheet UI. Works locally in your browser as a single HTML file (no data sent anywhe…☆34Jul 6, 2025Updated 9 months ago
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆32Feb 23, 2026Updated 2 months ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆105Feb 12, 2025Updated last year
- PwnWiki - The notes section of the pentesters mind.☆11Nov 16, 2016Updated 9 years ago
- This is a tool for installing all packages in Termux and is very useful for those of you who are just using Termux☆14Oct 16, 2025Updated 6 months ago
- Kwin script gives your terminal Alacritty or(and) Kitty the ability to drop down by shortcut.☆15Nov 24, 2025Updated 5 months ago
- Library of the useful macros for the @xonsh shell.☆20Apr 19, 2026Updated last week
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆438Mar 16, 2026Updated last month
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Command line tool for macaddress.io API.☆12Dec 11, 2018Updated 7 years ago
- Diversos projetos voltados à Segurança Cibernética☆12Nov 17, 2021Updated 4 years ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆16Dec 18, 2021Updated 4 years ago
- Shizuku management utilities for Termux☆79Feb 7, 2026Updated 2 months ago
- The `anonymous` script from ParrotSec OS and BackBox Linux, perfected to run on Kali Linux Rolling. Run the script with `sudo sh script.…☆138May 25, 2020Updated 5 years ago
- Ferramenta para escaneamento de redes Wi-Fi e brute force em serviços encontrados☆15Apr 20, 2025Updated last year
- 🧊 Collection of custom scripts for Qubes OS☆23Jul 26, 2024Updated last year
- A VM for RE and Pwn☆25May 17, 2024Updated last year
- Força bruta em formulários web.☆19Feb 8, 2015Updated 11 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- All the files necessary to package Apple's Swift Programming language for Fedora☆13Jan 28, 2025Updated last year
- A powerful tool for remotely controlling your PC via a Telegram bot, offering features like file management, system control, hardware int…☆14Jul 12, 2025Updated 9 months ago
- Study into generating POC / Exploits for the metasploit framework using LLMs☆13Aug 27, 2023Updated 2 years ago
- To run Burpsuite from launcher, You may run it in terminal by script, But by this tool you will able to run it from Launcher with a Burp …☆11Sep 24, 2023Updated 2 years ago
- ☆17Oct 6, 2025Updated 6 months ago
- AlphaTracker is a computer vision pipeline with the practical and real-time advantages , which requires minimal hardware requirements and…☆12Jan 10, 2023Updated 3 years ago
- A Machine Learning based tool for identifying P2P (Peer To Peer) Bot-Nets using network traffic analysis, as well as detect the hosts inv…☆12Jan 4, 2023Updated 3 years ago
- "Kali replacer." It has a large number of hacking tools.☆44Mar 31, 2020Updated 6 years ago
- A collection of OSINT websites and tools to aid penetration testers with their info gathering tasks☆17Oct 27, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- this's tool for installing wifite in youre termux without problem☆17Jan 20, 2019Updated 7 years ago
- NMAP with LLM summaries☆16Jan 15, 2024Updated 2 years ago
- LETS BUILD YOU AN OTPBYPASS BOT☆11Mar 14, 2022Updated 4 years ago
- Recover access to all logged in accounts and passwords for Google Chrome in just a few clicks!☆35Apr 4, 2014Updated 12 years ago
- ☆15Feb 5, 2025Updated last year
- ☆29May 6, 2025Updated 11 months ago
- An efficient spyware that is barely undetectable by antiviruses and get execute every time the computer start.☆22Apr 18, 2024Updated 2 years ago