OscarAkaElvis / zsh-parrot-theme
Zsh Parrot Security theme
β21Updated 6 years ago
Alternatives and similar repositories for zsh-parrot-theme:
Users that are interested in zsh-parrot-theme are comparing it to the libraries listed below
- π BurpSuite Pro Auto Installation Script For Linux And Windows! πβ18Updated 4 years ago
- Automatic reverse/bind shell generator cheat sheet.β35Updated 2 years ago
- w1f1t3kAl1β48Updated last year
- Obtain the passphrase of a private key (id_rsa), this tool uses the ssh-keygen binary to perform a brute force attack until a successful β¦β71Updated last week
- Wi-Fi Exploit Toolβ53Updated 4 years ago
- Red Team scripts written in pythonβ17Updated 2 years ago
- Summon Demon Linuxβ37Updated 10 months ago
- Custom kali build with i3 rice.β19Updated 8 months ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environmentβ11Updated 5 years ago
- Run search-that-hash from Google colab with fast offline (hashcat) modeβ35Updated 3 years ago
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to exploit a system or server that ruβ¦β15Updated 6 years ago
- Apache Tomcat Manager API WAR Shell Uploadβ33Updated 4 years ago
- Automatic & lightning fast wordpress vulnerability scannerβ45Updated 3 years ago
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicantβ81Updated 2 years ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBoxβ18Updated 2 years ago
- Mobile Pentesting Guide (WIP)β24Updated 4 years ago
- Customized Password/Passphrase List inputting Target Infoβ87Updated 4 months ago
- Writeups for NoobCTF 0x1, Dark-PreCTF, Zh3ro-CTFβ17Updated 3 years ago
- [ Automated Web Vulnerability Scanner ]β68Updated 4 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTCβ57Updated last year
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overfβ¦β18Updated 4 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.β62Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ21Updated 2 years ago
- Bypassing File Upload Restriction using Magic Bytesβ14Updated 2 years ago
- WPS pin generator written in Python 3β45Updated 4 years ago
- A fully customizable CLI application to coummunicate with and send commands to Ninja running behind any NAT, firewall and proxy! Providinβ¦β27Updated 2 years ago
- Interactive shell to execute commands anonymously using Proxychains and Torβ37Updated 2 years ago
- Powerful and smart Traffic Anonymizer using tor as a transparent proxyβ31Updated 2 years ago
- A collection of my adventures through hackthebox.euβ32Updated 3 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....β25Updated 6 years ago