TheOnodrim / ShieldLinks
Harden and secure your Debian or Debian based OS, with this simple zero-configuration Debian bash script
☆18Updated 3 years ago
Alternatives and similar repositories for Shield
Users that are interested in Shield are comparing it to the libraries listed below
Sorting:
- Custom security distro for remote penetration testing☆55Updated 4 years ago
- wifi attacks suite☆59Updated 4 years ago
- OpenVAS / Greenbone Vulnerability Manager (GVM) 11 Install Script for Kali Linux☆24Updated 4 years ago
- Malduino compatible USB rubber ducky payloads☆14Updated 6 years ago
- Bramble is a hacking Open source suite.☆84Updated 5 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆17Updated 2 years ago
- ☆14Updated 4 years ago
- Simple Karma Attack☆69Updated 4 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 4 years ago
- My collection of awesome resources, tools, and other shiny things for cyber security stuffs.☆16Updated 7 years ago
- Open Source Intelligence☆25Updated 8 years ago
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆42Updated 5 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆18Updated 4 years ago
- Airodump-ng WiFi Scan Visualizer☆60Updated 7 years ago
- Operational Security utility and automator.☆137Updated 5 years ago
- devops scripts☆33Updated 8 years ago
- All the tools you need to make your own mind up from the Open Data Sets☆139Updated 2 years ago
- Pentest ToolKit☆28Updated 5 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆56Updated last year
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆19Updated 5 months ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆31Updated last month
- Information gathering tool - OSINT☆38Updated 6 years ago
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆39Updated 7 years ago
- Wi-Fi Exploit Tool☆53Updated 5 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆14Updated 3 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆44Updated 9 years ago
- A Script to Convert Debian Linux into Kali Linux☆55Updated 6 years ago
- Metasploit Framework☆28Updated 11 years ago
- PANhunt searches for credit card numbers (PANs) in directories.☆150Updated 2 years ago