OscarAkaElvis / zsh-parrot-theme
Zsh Parrot Security theme
☆21Updated 6 years ago
Alternatives and similar repositories for zsh-parrot-theme:
Users that are interested in zsh-parrot-theme are comparing it to the libraries listed below
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overf…☆18Updated 3 years ago
- Automatic reverse/bind shell generator cheat sheet.☆35Updated 2 years ago
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆79Updated 2 years ago
- gui tool to create normal payload by msfvenom☆32Updated 6 years ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆14Updated 2 years ago
- Obtain handshakes from networks out of your range!☆27Updated 3 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆55Updated last year
- Obtain the passphrase of a private key (id_rsa), this tool uses the ssh-keygen binary to perform a brute force attack until a successful …☆64Updated this week
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆11Updated 5 years ago
- Apache Tomcat Manager API WAR Shell Upload☆31Updated 4 years ago
- Command Execution exploiter with an auto connection handling☆34Updated 2 years ago
- Install Nvidia drivers on Kali Linux safely in 10 easy steps.☆41Updated 6 years ago
- A Conky For parrot Os☆9Updated 6 years ago
- Simple script to download some missing tools in Kali☆33Updated 4 years ago
- ☆20Updated last year
- Bypassing File Upload Restriction using Magic Bytes☆13Updated 2 years ago
- Wi-Fi Exploit Tool☆53Updated 4 years ago
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆130Updated 9 months ago
- Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured sys…☆37Updated 6 months ago
- 😁 BurpSuite Pro Auto Installation Script For Linux And Windows! 👍☆18Updated 4 years ago
- BlackArch menu, theme, and config for Xfce.☆16Updated 3 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆51Updated 4 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆24Updated 6 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 3 years ago
- Your WordPress site's best friend☆9Updated 2 years ago
- A PowerShell script that simplifies life and therefore... phishing.☆17Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆33Updated 4 years ago
- i3 rice Inspired by Cyberpunk 2077☆29Updated 3 years ago
- A collection of hacks and one-off scripts☆18Updated 3 years ago