Jubei-Mitsuyoshi / debianLinks
debian scripts and code
☆17Updated 8 years ago
Alternatives and similar repositories for debian
Users that are interested in debian are comparing it to the libraries listed below
Sorting:
- ☆17Updated 3 years ago
- kali-sly-pi☆33Updated 6 years ago
- Hacking environment installation scripts for OS X☆26Updated 3 years ago
- BlackArch Linux Keyring☆21Updated 6 years ago
- Chef repository for pentesting tools☆13Updated 8 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆21Updated 10 years ago
- Scripts for Kali Linux☆17Updated 8 years ago
- ☆36Updated 6 years ago
- Registry Based Artifact Collection and Correlation☆10Updated 9 years ago
- SIP hacking tools and scripts☆22Updated 4 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- ARP spoof then session jack within your browser☆28Updated 11 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Auto Reaver - multiple access point attack using Reaver☆53Updated 8 years ago
- Maltego with a twist of wireless☆26Updated 10 years ago
- Scripts for starting, stopping, checking setup and others ported from Kali Linux for general systemd systems☆16Updated 8 years ago
- cSploit traffic manipulator☆30Updated 7 years ago
- Multi protocol sniffer, created for ChaosConstruction conference HackSpace☆9Updated 12 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- Service desk password tools.☆16Updated 8 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 11 years ago
- Script to change all MAC Addresses☆12Updated 11 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- GSM Sniffer☆36Updated 13 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Updated 10 years ago
- The LAZY script will make your life easier, and of course faster.☆9Updated 7 years ago
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- Meteor package for client + server side IMSI-catcher detection.☆19Updated 9 years ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Updated last month