TheOnodrim / ShieldLinks
Harden and secure your Debian or Debian based OS, with this simple zero-configuration Debian bash script
☆18Updated 3 years ago
Alternatives and similar repositories for Shield
Users that are interested in Shield are comparing it to the libraries listed below
Sorting:
- Custom security distro for remote penetration testing☆56Updated 4 years ago
- Demon Pentest Shell☆15Updated 4 years ago
- ☆14Updated 4 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Updated 4 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆58Updated 2 years ago
- Security Audit Bash Script for Linux Systems☆54Updated 3 months ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆55Updated 4 years ago
- ☆17Updated 6 years ago
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- Scripts related to offensiveosint.io☆24Updated 5 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆17Updated 4 years ago
- Bramble is a hacking Open source suite.☆85Updated 5 years ago
- My collection of awesome resources, tools, and other shiny things for cyber security stuffs.☆16Updated 7 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆16Updated 2 years ago
- A Script to Convert Debian Linux into Kali Linux☆55Updated 6 years ago
- Pentest ToolKit☆28Updated 5 years ago
- A Network Automation framework focused on Cyber-Security☆48Updated 2 years ago
- A standalone addon for GnuPG☆18Updated 7 years ago
- An Automated Network Penetration and Vulnerability Analysis Tool Written In Bash☆29Updated 3 years ago
- Information gathering tool - OSINT☆39Updated 6 years ago
- devops scripts☆32Updated 8 years ago
- Open Secure-K OS is an operating system booting from a USB key in which you can safely create and store your personal and private data. …☆41Updated 9 months ago
- Simple Karma Attack☆69Updated 5 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 4 months ago
- A script to build either Blackarch, Kali linux or ParrotOS Docker container which has the ability to provide desktop environment access e…☆39Updated 3 years ago
- GhostNET script that will help you be safer on the cyber☆64Updated 4 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆23Updated 6 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Updated 5 years ago
- Light Armoured Recon is a python script designed to automate passive recon. It automates execution of TheHarvester, whois, Robtex.com, Bu…☆41Updated 7 years ago
- Use Tor for anonymous scanning with nmap☆86Updated 10 years ago