MrM8BRH / SuperRepositoryLinks
Super Repository streamlines package and tool installations on Linux. It combines a variety of packages, tools, and repositories from official sources. Using package managers like apt, snap, and pip3, it ensures smooth installations.
☆22Updated last year
Alternatives and similar repositories for SuperRepository
Users that are interested in SuperRepository are comparing it to the libraries listed below
Sorting:
- using this script you can check your sites is vulnerable or not for heart bleeding vulnerability.☆41Updated 7 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆35Updated 5 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆23Updated 4 years ago
- Subscan is a simple tool for subdomain scanner, it can scan subdomains fast.☆36Updated last year
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆22Updated 2 years ago
- This tool is used to find the admin login page of a website.☆17Updated 4 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆56Updated last year
- Tools for Pentesting that all hacker need....☆17Updated 2 years ago
- The_Scripter is tools for making pentesting easy. It contains lots of automation scripts like hash cracker, ssh_cracker,etc.☆13Updated 2 years ago
- Hax is a mini-tool with really useful hacking tools.☆19Updated 2 years ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆88Updated 9 months ago
- Advanced Reconnaissance tool to enumerate attacking surface of the target.☆54Updated 5 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆18Updated 4 years ago
- phishfactory offers a variety of email templates for spear-phishing attacks. [more templates to still be added]☆21Updated 4 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆15Updated 4 years ago
- Hackerinfo infromations Web Application Security☆73Updated 2 years ago
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆50Updated 4 years ago
- python script that hide phishing url like a pro "masking url technique"☆40Updated 3 years ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- DirAttack tools, Search file or directory on website☆45Updated 5 years ago
- XSSRecon - Reflected XSS Scanner☆27Updated 4 years ago
- HacKing Tools Downloader: Downloading HacKing Tools and exporting by categories to $HOME directory☆85Updated 3 years ago
- SADBOT - A simple tool for exploitation on android devices via ADB, users can find vulnerable devices using shodan search.☆41Updated 2 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Updated 6 years ago
- A very user friendly and advanced phishing toolkit made for hackers☆35Updated 3 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- Termux website scanner☆19Updated 4 years ago
- Dorking google with python (easy) (support Termux)☆50Updated 5 years ago
- Reverse And Dorking Tools☆25Updated 4 years ago
- Gmail shell, for hackers execute commands via gmail☆19Updated 4 years ago