SofianeHamlaoui / Go-undercoverLinks
GUC - Go UnderCover : Switch appearance from *unix to Windows ( Kali-undercover for all distros )
☆35Updated last year
Alternatives and similar repositories for Go-undercover
Users that are interested in Go-undercover are comparing it to the libraries listed below
Sorting:
- Multiplatform Telegram Bot in pure PowerShell☆53Updated 2 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆39Updated 2 years ago
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆79Updated 2 years ago
- Windows Hacking FrameWork using Reverse Shell☆108Updated 5 months ago
- it's a script that generates a gnome wallpaper with the pc processes in a word cloud that looks like a picture.☆31Updated last year
- WARZONE RAT 1.71 CRACKED by UNKNOWN-Remote Administration Trojan-RAT☆14Updated 5 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆16Updated 3 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆17Updated 2 years ago
- Upgrade kali linux default installation☆14Updated 2 months ago
- Wordlist generated using leaked databases, Pipal, and CUPP.☆34Updated 7 years ago
- Useful related to airgeddon packages for Debian based Linux distributions☆50Updated 3 months ago
- A swiss army knife for pentesting networks☆20Updated 2 years ago
- Hacking Tools For All Debian-based OS☆52Updated 7 years ago
- Network sniffing automation with Bettercap as rogue AP or as client in your network☆25Updated 3 years ago
- Open Secure-K OS is an operating system booting from a USB key in which you can safely create and store your personal and private data. …☆41Updated 6 months ago
- POWER(SHELL) ALL THE THINGS!☆34Updated 3 months ago
- Sphinx.bot is a platform for collecting data leaks. All information recorded here is publicly available on the web. Any malicious use of …☆46Updated 2 years ago
- Malware and malicious applications database☆38Updated last year
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆15Updated 5 years ago
- Collection of FOSS/Freeware. Most tools here are portable, which can be useful for when you are out-and-about. Obviously dedicated lab …☆24Updated 2 months ago
- AMC (Automatic Media Access Control [MAC] Address Spoofing tool), Helps you to protect your real network hardware identity. Each entered …☆24Updated 9 months ago
- A script to build either Blackarch, Kali linux or ParrotOS Docker container which has the ability to provide desktop environment access e…☆39Updated 3 years ago
- A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.☆14Updated 5 years ago
- Script to facilitate different functions and checks☆47Updated 3 years ago
- Ded Security Framework is a tool aimed at security professionals☆36Updated last year
- Android pin cracker☆12Updated 3 years ago
- Retreives the SSID names and passwords in cleartext for each Wifi network stored on the computer running this powershell script and outpu…☆83Updated 7 years ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- A lightweight ducky script generator written in python.☆30Updated 4 years ago
- This is a program that will install Metasploit-Framework and Armitage on to any Debian-based Linux Distro (it can also be adapted to work…☆62Updated 3 years ago