Re4son / Pocket-Kali-live-buildView external linksLinks
Debian live build for the Pocket-Kali
☆41May 16, 2018Updated 7 years ago
Alternatives and similar repositories for Pocket-Kali-live-build
Users that are interested in Pocket-Kali-live-build are comparing it to the libraries listed below
Sorting:
- Kernel source tree for Raspberry Pi Foundation-provided kernel builds. Issues unrelated to the linux kernel should be posted on the commu…☆39Jul 2, 2022Updated 3 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- Forked MaruOS installer for Nethunter☆17Feb 16, 2018Updated 8 years ago
- Payloads for the Hak5 Bash Bunny☆11Apr 2, 2017Updated 8 years ago
- ☆12May 9, 2017Updated 8 years ago
- Docker container for Zachary Rice Gitleaks☆20Aug 16, 2019Updated 6 years ago
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- A real-time, node-based video effects compositor for the web built with HTML5, Javascript and WebGL☆13Jan 2, 2021Updated 5 years ago
- An android application which is useful in capturing BLE advertisement packets and storing the data collected in the phone storage as a cs…☆10Jun 29, 2017Updated 8 years ago
- An embedded bus adapter for various microcontrollers and radios.☆15Dec 16, 2014Updated 11 years ago
- ☆13Dec 14, 2023Updated 2 years ago
- Openframeworks openCV and OSC sending to Node App for AR Parrot drone☆16Feb 3, 2014Updated 12 years ago
- Unofficial Arch Linux repo for the GPD Pocket☆18Jan 5, 2018Updated 8 years ago
- A modern-designed android terminal emulator for the 21st century.☆14Nov 24, 2017Updated 8 years ago
- A VT-100 terminal emulator for the Android OS☆17May 24, 2020Updated 5 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Jun 12, 2017Updated 8 years ago
- ssh session type for metasploit☆101Feb 5, 2023Updated 3 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Jan 12, 2015Updated 11 years ago
- NetHunter android application☆21Nov 4, 2017Updated 8 years ago
- Tunnel IP over ICMP.☆16Jul 13, 2016Updated 9 years ago
- Python - Human Interface Device Android Attack Framework☆48Apr 30, 2017Updated 8 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Aug 27, 2018Updated 7 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Since insta360 doesn't offer the possibility to get the livestream with a computer without a cell phone in between I reverse engineered t…☆27Dec 11, 2023Updated 2 years ago
- Guide to configure rasberry pi, hackrf one and soapy sdr to control the device remotely.☆17Oct 4, 2022Updated 3 years ago
- ☆231Nov 20, 2019Updated 6 years ago
- 🕵🏻📡👁🔍Analyzes all Open Wireless Networks for detect fake access points (Fingerprint)☆16Aug 13, 2018Updated 7 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Apps related with GPS receiver and jamming☆21Nov 10, 2022Updated 3 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Dec 25, 2018Updated 7 years ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆28Jan 27, 2017Updated 9 years ago
- 📡🔍Searches for wifi-pineapple traces and calculate wireless network security score 🍍☆160May 14, 2020Updated 5 years ago
- A NodeMCU based wifi scanner that logs SSIDs to a text file on a sd card.☆21Oct 1, 2018Updated 7 years ago
- Web catalog generator for Nintendo 3DS CIA files.☆12Nov 24, 2018Updated 7 years ago
- Mobile application testing toolkit☆244Nov 8, 2018Updated 7 years ago
- Reconnaissance scripts for penetration testing☆59Jul 7, 2015Updated 10 years ago
- 33C3 CTF binary challenge☆27Jan 6, 2017Updated 9 years ago
- Tool for capturing and mapping locations of SSIDs from wireless beacons and client requests☆25Mar 4, 2018Updated 7 years ago
- Sub-domains enumeration framework☆27Nov 26, 2017Updated 8 years ago