MrM8BRH / SuperRepository
Super Repository streamlines package and tool installations on Linux. It combines a variety of packages, tools, and repositories from official sources. Using package managers like apt, snap, and pip3, it ensures smooth installations.
☆23Updated last year
Alternatives and similar repositories for SuperRepository:
Users that are interested in SuperRepository are comparing it to the libraries listed below
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆23Updated 4 years ago
- Tools for Pentesting that all hacker need....☆16Updated 2 years ago
- ☆30Updated 8 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆9Updated 3 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11Updated last year
- Dorking google with python (easy) (support Termux)☆41Updated 4 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated 2 years ago
- FrameDomain Framework - subdomains enumeration tool for penetration testers☆30Updated 3 years ago
- Fast subdomains enumeration tool for penetration testers☆17Updated 5 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Updated 5 years ago
- Tenssens framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resourc…☆67Updated 3 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆14Updated 4 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- using this script you can check your sites is vulnerable or not for heart bleeding vulnerability.☆38Updated 6 years ago
- python script that hide phishing url like a pro "masking url technique"☆37Updated 3 years ago
- CUPP - Common User Passwords Profiler !☆12Updated 8 months ago
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆51Updated 4 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Termux website scanner☆17Updated 3 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆17Updated 2 years ago
- Hello zheyeng :v☆18Updated 5 years ago
- A Auto Tor IP Changer Tool.This program can automatic change our tor idenity/ip.100% working.☆30Updated 4 years ago
- XSSRecon - Reflected XSS Scanner☆23Updated 4 years ago
- Advance Google Dorker and Vulnerability Scanner☆49Updated 6 years ago
- This is a simple web application vulnerability scanner that checks if a given URL or IP address is vulnerable to 37 common web applicatio…☆22Updated last year
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆35Updated 5 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆15Updated 3 years ago
- This tool is used to find the admin login page of a website.☆16Updated 4 years ago
- Based on reading from The Hackers Playbook 3☆30Updated 4 years ago