RackunSec / SummonLinks
Summon Demon Linux
☆39Updated last year
Alternatives and similar repositories for Summon
Users that are interested in Summon are comparing it to the libraries listed below
Sorting:
- Scripts to set up Kali Linux with additional tools, and maintain them.☆67Updated last month
- Find exploits in local and online database☆80Updated last year
- Easy Mac Changer - Change your MAC Address (EASIER and FASTER than EVER)☆74Updated 6 years ago
- Upgrade kali linux default installation☆15Updated 2 months ago
- HacKing Tools Downloader: Downloading HacKing Tools and exporting by categories to $HOME directory☆88Updated 3 years ago
- Automated rogue access point setup tool.☆200Updated 4 years ago
- This is a program that will install Metasploit-Framework and Armitage on to any Debian-based Linux Distro (it can also be adapted to work…☆60Updated 3 years ago
- This Script Will Detect Canary Token in Microsoft Word Documents☆56Updated 5 years ago
- The `anonymous` script from ParrotSec OS and BackBox Linux, perfected to run on Kali Linux Rolling. Run the script with `sudo sh script.…☆134Updated 5 years ago
- Parrot OS Terminal For Kali linux☆43Updated 6 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆120Updated 2 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆87Updated 5 years ago
- A Bash/JS Script For Tracking Locations☆138Updated 3 years ago
- PhishX - The Complete Spear Phishing Tool☆111Updated 7 years ago
- Plugins for airgeddon☆82Updated last week
- Fork from @rsmudge/armitage☆140Updated 3 years ago
- An Automated Database Hacking Software with Database Dorks Hacking☆30Updated 6 years ago
- Based on reading from The Hackers Playbook 3☆29Updated 5 years ago
- Distrubición Linux para Osint☆56Updated 7 years ago
- PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.☆140Updated 4 months ago
- Information Gathering tool for a Website or IP address☆65Updated last year
- GUI Osint Framework with Kali Linux☆170Updated 2 years ago
- Project to implement and automate juice jacking: the stealing of phone data through USB connections☆103Updated 8 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 4 years ago
- Information Gathering Tool☆61Updated 2 years ago
- Powerful and smart Traffic Anonymizer using tor as a transparent proxy☆34Updated 8 months ago
- 📦 Wireless Attacks Tools 🕷️☆72Updated last year
- Simple script for the WHID injector - a rubberducky wifi☆116Updated last year
- Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standa…☆68Updated 6 years ago
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆114Updated 4 years ago