Wh1t3Rh1n0 / deb2kali
A Script to Convert Debian Linux into Kali Linux
☆52Updated 5 years ago
Alternatives and similar repositories for deb2kali:
Users that are interested in deb2kali are comparing it to the libraries listed below
- Pentest dropbox setup scripts for Kali Linux☆88Updated 9 years ago
- Linux setup tool for Kali Linux☆78Updated 6 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- Bash script to fully setup your kali system.☆48Updated 5 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆44Updated 9 years ago
- Wiki to collect Red Team infrastructure hardening resources☆20Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 6 years ago
- Tool to automatic leak information using Hacking with engine searches☆92Updated 6 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- Use Tor for anonymous scanning with nmap☆82Updated 9 years ago
- Script for Kali that adds a bunch of tools and customizes it to be much better☆181Updated 4 years ago
- Massive arsenal of hacker tools...☆78Updated 7 years ago
- Automated Tools Pentest☆7Updated last year
- ☆60Updated 7 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- ☆81Updated last year
- The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/The…☆35Updated 5 years ago
- Penetration Testing/Security Cheatsheets☆58Updated 9 years ago
- PowerShell Empire mod to post-exploit the World!☆136Updated 6 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 10 years ago
- SMBMap is a handy SMB enumeration tool☆37Updated 10 months ago
- Customized Kali Linux - Ansible playbook☆63Updated 4 years ago
- Script to automate, manage, and multithread Nikto scans.☆59Updated 5 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Updated 11 years ago
- Custom password cracking rules for Hashcat and John the Ripper☆86Updated 8 months ago
- Program to perform vulnerability analysis and automatically generate a report☆56Updated 2 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆93Updated 8 years ago
- Quick script to set up VPN server and reverse VPN for Nethunter☆35Updated 8 years ago
- A curated list of awesome infosec resources.☆27Updated 9 years ago
- Android and iOS source for the Empire mobile app☆89Updated 6 years ago