MrM8BRH / SuperRepository
Super Repository streamlines package and tool installations on Linux. It combines a variety of packages, tools, and repositories from official sources. Using package managers like apt, snap, and pip3, it ensures smooth installations.
☆22Updated last year
Alternatives and similar repositories for SuperRepository:
Users that are interested in SuperRepository are comparing it to the libraries listed below
- Gmail shell, for hackers execute commands via gmail☆18Updated 4 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆23Updated 4 years ago
- An Automated Database Hacking Software with Database Dorks Hacking☆29Updated 5 years ago
- Tools for Pentesting that all hacker need....☆16Updated 2 years ago
- using this script you can check your sites is vulnerable or not for heart bleeding vulnerability.☆40Updated 7 years ago
- H-SPLOIT-PAYLOAD GENERATE METASPLOIT PAYLOAD IN 1 CLICK☆29Updated 3 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆20Updated 2 years ago
- People Profiler (fake script)☆21Updated 6 months ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆84Updated 6 months ago
- XDROID is android all in one hack tools☆37Updated last month
- Dorking google with python (easy) (support Termux)☆48Updated 4 years ago
- ☆33Updated 8 years ago
- FrameDomain Framework - subdomains enumeration tool for penetration testers☆31Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆52Updated 7 years ago
- A very user friendly and advanced phishing toolkit made for hackers☆28Updated 3 years ago
- python script that hide phishing url like a pro "masking url technique"☆40Updated 3 years ago
- Advance Google Dorker and Vulnerability Scanner☆48Updated 6 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Updated 5 years ago
- Fast exploitation based on metasploit.☆73Updated 5 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆18Updated 2 years ago
- Tenssens framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resourc…☆67Updated 3 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆9Updated 3 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆35Updated 5 years ago
- This tool is used to find the admin login page of a website.☆16Updated 4 years ago
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆51Updated 4 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆39Updated 7 months ago
- This is an amazing tool using which you can download all tools for termux.☆39Updated 2 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆18Updated 4 years ago
- Best Google Dorker Available☆33Updated 6 months ago
- Link Reveal☆23Updated 6 months ago