Upgrade kali linux default installation
☆16Nov 19, 2025Updated 4 months ago
Alternatives and similar repositories for Kali-Booster
Users that are interested in Kali-Booster are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Apr 29, 2023Updated 2 years ago
- HOW TO FIX THE MISSING FIRMWARE OR THE NONFREE FIRMWARE AFTER KALI-LINUX INSTALLATION☆39Sep 25, 2018Updated 7 years ago
- XSS (Cross Site Scripting) attack is performed on a website of Bank Management System using Kali Linux and Burp Suite☆10Aug 25, 2021Updated 4 years ago
- A collection of scripts to run on a fresh install of kali linux☆36Feb 17, 2018Updated 8 years ago
- Automation script to download missing tools and configurate kali linux for various cybersecurity categories☆55Feb 25, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Alternative password shadowing scheme☆10Feb 22, 2026Updated last month
- ☆11Feb 9, 2023Updated 3 years ago
- Shell script to install all my tools in Kali Linux. Includes software tools, Python libraries, and OS updates all in one script.☆18Dec 11, 2019Updated 6 years ago
- various collected notes, some copy/pasted from elsewhere, but mostly original☆10Jun 28, 2016Updated 9 years ago
- A Tool For Absolute Beginners On Kali Linux. An Interactive Script That'll Guide You Through Attacks.☆73Aug 19, 2022Updated 3 years ago
- A little script witten in bash to fire up Ettercap and SSLstrip during a Network Penetration testing☆20Sep 6, 2017Updated 8 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Legacy password hashing framework for PHP applications needing to support or having previously supported PHP below 5.5☆16Nov 22, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆12Sep 14, 2022Updated 3 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- ☆12Mar 10, 2026Updated 2 weeks ago
- Script to install pentest tools on Alpine Linux☆12Jul 3, 2015Updated 10 years ago
- All the files necessary to package Apple's Swift Programming language for Fedora☆12Jan 28, 2025Updated last year
- A database and collection of hack and translation files☆12Jun 28, 2019Updated 6 years ago
- Small container runtime for threat detection☆14Apr 13, 2025Updated 11 months ago
- zsh configuration for macos based on Kali Linux☆33Aug 22, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A script to build either Blackarch, Kali linux or ParrotOS Docker container which has the ability to provide desktop environment access e…☆42Jan 12, 2022Updated 4 years ago
- Implementation of bcrypt password hashing scheme☆12Jan 11, 2021Updated 5 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Mar 13, 2026Updated last week
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- A tool to copy only the changed files to a new folder, useful to create incremental update packages.☆11Jan 27, 2022Updated 4 years ago
- appimage-builder project documetnation☆10Oct 27, 2023Updated 2 years ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- Scripts and Modules for forensical analyses of mysql database systems☆22Sep 19, 2014Updated 11 years ago
- A hands-on workshop to learn how to do threat detection and response in AWS.☆11Sep 13, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Plugin for Recaf, which allows you to no-op methods with a single click.☆17May 22, 2021Updated 4 years ago
- Wordlists generated over the years of penetration testing☆14Mar 18, 2025Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆12Jun 24, 2021Updated 4 years ago
- Adding PowerShell scripts that I use on my Proxmox server to automate certain tasks.☆13Jan 9, 2026Updated 2 months ago
- CSV Manager for AWS Security Hub exports SecurityHub findings to a CSV file and allows you to mass-update SecurityHub findings by modifyi…☆17Jul 23, 2025Updated 8 months ago
- Minimal, bento-box style Ubuntu-based WSL distro.☆11Nov 12, 2023Updated 2 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago