InfoSecWarrior / Kali-Linux-ConfigurationLinks
Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers everything from repository setup and NVIDIA driver installation to Python configuration and essential tool installation, ensuring an optimized setup for penetration testing tasks.
☆35Updated last year
Alternatives and similar repositories for Kali-Linux-Configuration
Users that are interested in Kali-Linux-Configuration are comparing it to the libraries listed below
Sorting:
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 5 years ago
- An Automated Database Hacking Software with Database Dorks Hacking☆30Updated 6 years ago
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆67Updated 2 years ago
- SADBOT - A simple tool for exploitation on android devices via ADB, users can find vulnerable devices using shodan search.☆77Updated 3 years ago
- automate wifi hacking with wicker☆64Updated last year
- Wifi password cracking tool tested (PLDT-Home Wifi)☆55Updated last year
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆22Updated last year
- Automated Wireless Attack Framework☆74Updated 6 years ago
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆77Updated 2 years ago
- Hacking every email by use script Mr.Robot☆57Updated 7 years ago
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆65Updated 2 years ago
- An automated phishing tool with templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse…☆107Updated 3 years ago
- An Effiecent Tool To Change Tor IP's in Seconds,change mac address and clean all logs☆38Updated 4 years ago
- Advance OTP Bypass Tool. Termux Supported.☆109Updated 11 months ago
- A social engineering toolkit for performing smishing, and other sms attacks☆106Updated last year
- Make a Fake wireless access point aka Evil Twin....Easily!!☆71Updated 2 years ago
- Advanced Reconnaissance tool to enumerate attacking surface of the target.☆56Updated 6 years ago
- Hackerinfo infromations Web Application Security☆74Updated 2 years ago
- The ultimate Metasploit apk binder with legit apk written in python3☆35Updated 3 years ago
- -- -- File generated with SQLiteStudio v3.2.1 on Sun Feb 7 1428 2021 -- -- Text encoding used: System -- PRAGMA foreign_keys = off; BEGIN…☆122Updated last year
- Worm/Trojan/Ransomware/apt/Rootkit/Virus Database☆100Updated last year
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆91Updated 2 months ago
- 📦 Wireless Attacks Tools 🕷️☆72Updated 2 years ago
- Information Gathering Simplified.☆75Updated 3 years ago
- 🕵️ Track down social media profiles using a specific username across multiple social network platforms☆62Updated last month
- A very user friendly and advanced phishing toolkit made for hackers☆35Updated 4 years ago
- HacKing Tools Downloader: Downloading HacKing Tools and exporting by categories to $HOME directory☆88Updated 3 years ago
- Evil-Droid is a framework that creates & generates & embed apk payload to penetrate Android platforms.☆39Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆64Updated last year
- ANDRO Unleash Mobile Security with our Android Exploitation and Analysis Tool. Identify vulnerabilities, reverse engineer apps, and forti…☆100Updated 2 weeks ago