LionSec / katoolinLinks
Automatically install all Kali linux tools
☆4,984Updated last year
Alternatives and similar repositories for katoolin
Users that are interested in katoolin are comparing it to the libraries listed below
Sorting:
- The LAZY script will make your life easier, and of course faster.☆4,204Updated 3 years ago
- Efficient and advanced man in the middle framework☆2,102Updated 2 years ago
- The Kali NetHunter Project☆3,612Updated 6 years ago
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,304Updated 10 months ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,124Updated 5 years ago
- A port of ParrotSec's stealth and anonsurf modules to Kali Linux☆1,706Updated 3 months ago
- Transparent proxy through Tor for Kali Linux OS☆1,126Updated last year
- Network Attack Tool☆1,469Updated 2 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆11,997Updated 7 months ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,657Updated last week
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆10,073Updated last year
- Kali Linux Recipes☆674Updated 6 years ago
- Tools for Pentesting☆2,058Updated last year
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,313Updated 8 months ago
- Attack Surface Management Platform☆8,793Updated this week
- Phishing Tool & Information Collector☆4,376Updated 7 months ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,354Updated last year
- Unified repository for different Metasploit Framework payloads☆1,843Updated last week
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,055Updated 3 months ago
- Powerful framework for rogue access point attack.☆2,190Updated last year
- Kali Linux Cheat Sheet for Penetration Testers☆2,356Updated last year
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,285Updated this week
- 💤 Kick devices off your network by performing an ARP Spoof attack.☆2,598Updated 2 years ago
- Common User Passwords Profiler (CUPP)☆4,817Updated last year
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,227Updated 3 years ago
- Automated Mass Exploiter☆5,122Updated 2 years ago
- Exploitation Framework for Embedded Devices☆12,564Updated last month
- Automatically brute force all services running on a target.☆2,087Updated 9 months ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,835Updated last year
- Veil 3.1.X (Check version info in Veil at runtime)☆4,111Updated last year