alishahid74 / kali-gptLinks
Whether you're a seasoned expert or a beginner, Kali GPT helps streamline your workflow, making penetration testing more efficient and accessible.
☆17Updated last month
Alternatives and similar repositories for kali-gpt
Users that are interested in kali-gpt are comparing it to the libraries listed below
Sorting:
- Kali Packerge Manager☆65Updated 2 years ago
- Community packages of John the Ripper, the auditing tool and advanced offline password cracker (Docker images, Windows PortableApp, Mac O…☆144Updated last month
- OSINT Eye Mobile☆22Updated 10 months ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆75Updated last year
- A Browser Extension for chromium/firefox browser. Small tool for Developers & Pentesters.☆27Updated last month
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆15Updated 9 months ago
- "ACCESS LIST" Bypass collections used during pentesting, gathered in one place. The list types include tools, usernames, passwords, comb…☆32Updated this week
- An ongoing collection of awesome android security tools, software, libraries, learning tutorials, frameworks, academic and practical reso…☆28Updated 3 years ago
- Arkhota, a web brute forcer for Android.☆19Updated 2 years ago
- Detection for CVE-2025-61882 & CVE-2025-61884☆37Updated 2 months ago
- A repository preserving darknet market data, including vendor lists, PGP keys, listings, and more for research & intelligence purposes.☆48Updated 6 months ago
- Upgrading jsleak with a CI/CD and new rules☆16Updated 2 years ago
- ☆45Updated last month
- An Simple PHP Webshell Manager to bypassed security system☆21Updated last year
- AircrackNG commands guide☆19Updated 7 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Networks and Tools that are used to access and navigate on "darknets"☆51Updated last year
- An Effiecent Tool To Change Tor IP's in Seconds,change mac address and clean all logs☆39Updated 4 years ago
- ☆62Updated 5 years ago
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆43Updated 7 months ago
- A swiss army knife for pentesting networks☆23Updated 2 years ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆56Updated 10 months ago
- List of NSO Pegasus's C2C Servers where will be used to control Pegasus.☆19Updated last month
- Python-based web scraper for a darkweb marketplace on the Tor network.☆37Updated last year
- A GUI Frontend for services provided by https://thc.org/segfault☆78Updated last year
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Updated last year
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆92Updated 3 months ago
- proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, …☆33Updated 2 years ago
- This Python script aims to enhance your online privacy and security by automatically rotating your DNS settings at a set interval (defaul…☆27Updated 3 weeks ago
- A collection of android security related resources. With repository stars⭐ and forks🍴☆39Updated this week