InfoSecWarrior / Kali-Linux-ConfigurationLinks
Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers everything from repository setup and NVIDIA driver installation to Python configuration and essential tool installation, ensuring an optimized setup for penetration testing tasks.
☆24Updated 7 months ago
Alternatives and similar repositories for Kali-Linux-Configuration
Users that are interested in Kali-Linux-Configuration are comparing it to the libraries listed below
Sorting:
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 4 years ago
- An Effiecent Tool To Change Tor IP's in Seconds,change mac address and clean all logs☆36Updated 3 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated 11 months ago
- automate wifi hacking with wicker☆57Updated last year
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆23Updated 9 months ago
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆52Updated 2 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆42Updated 2 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆23Updated 2 years ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆87Updated 9 months ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆25Updated 3 years ago
- Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools☆57Updated 2 years ago
- OSINT automation for hackers.☆15Updated 2 years ago
- Dogma V1.5.3☆30Updated 5 years ago
- Find exploits in local and online database☆77Updated 10 months ago
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆75Updated 2 years ago
- A tool for WI-FI penetration testing that automates your attacking processes.☆34Updated 5 months ago
- Advanced Reconnaissance tool to enumerate attacking surface of the target.☆54Updated 5 years ago
- XSSRecon - Reflected XSS Scanner☆28Updated 4 years ago
- Recon Automation for BugBounties☆11Updated 10 months ago
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆45Updated 11 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆48Updated last year
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- An Automated Database Hacking Software with Database Dorks Hacking☆31Updated 5 years ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- ☆16Updated 6 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆24Updated 4 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆23Updated 4 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆71Updated 2 years ago
- Information Gathering Simplified.☆70Updated 2 years ago
- A very user friendly and advanced phishing toolkit made for hackers☆35Updated 3 years ago