UCYBERS / setupkaliLinks
Kali Linux Customization and Setup Tool for Newly Imported VM's
☆31Updated 6 months ago
Alternatives and similar repositories for setupkali
Users that are interested in setupkali are comparing it to the libraries listed below
Sorting:
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆49Updated last month
- ☆145Updated 7 months ago
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆150Updated last year
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆258Updated last year
- A tool for automatically change the Tor IP address over time.☆123Updated 9 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆257Updated 9 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆99Updated 2 years ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆158Updated last year
- Tool for automate bug hunting process 🔍 --> 🍭☆46Updated 6 months ago
- Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify your web applications against mal…☆303Updated 2 weeks ago
- HackerToolkit offers a curated selection of tools designed to enhance your hacking capabilities. This repository not only organizes these…☆99Updated last year
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆32Updated 9 months ago
- PIP-INTEL is an OSINT (Open Source Intelligence) tool designed using various open-source tools and pip packages.☆188Updated last year
- Automatic tool to find Google Dorks☆36Updated last year
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆162Updated last year
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.☆67Updated 3 years ago
- Your Guide to browse Onine sites☆155Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆168Updated 9 months ago
- ☆17Updated 8 months ago
- A utility for detecting webpage inputs and conducting XSS scans.☆160Updated last year
- Security testing tool for analyzing HTTP 403 responses and identifying access control misconfigurations in web applications.☆165Updated this week
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆300Updated 2 years ago
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a var…☆47Updated 7 months ago
- Nessus Professional Latest☆45Updated last year
- NetworkSherlock: powerful and flexible port scanning tool With Shodan☆114Updated 6 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆55Updated last year
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆123Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆216Updated 3 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆177Updated last year
- Ashok is a OSINT Recon Tool , a.k.a Swiss Army knife .☆350Updated 3 years ago