A guide to using Kali Linux tools for web penetration testing, ethical hacking, forensics, and bug bounty. Covers setup, key tools, methodologies, and best practices. Optimized for security professionals.
☆86Apr 16, 2026Updated 2 weeks ago
Alternatives and similar repositories for Kali-Linux
Users that are interested in Kali-Linux are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Explore a collection of resources and projects in Computer Science, covering algorithms, data structures, programming languages, and emer…☆74Apr 16, 2026Updated 2 weeks ago
- This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in …☆808Apr 16, 2026Updated 2 weeks ago
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆19Dec 23, 2024Updated last year
- DDoS Attack Using Termux☆24Jan 3, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Welcome to my Flipper Zero Bad USB repository! This collection of tools is designed for ethical hacking and penetration testing purposes …☆11Nov 21, 2023Updated 2 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 11 months ago
- Detection for CVE-2025-61882 & CVE-2025-61884☆36Oct 14, 2025Updated 6 months ago
- Want .uf2 files for your switch hacking needs? ask and link to the .bin payload you want, and I may get to it in my free time. I understa…☆18Feb 4, 2021Updated 5 years ago
- A tool designed to analyse email headers☆41Oct 4, 2022Updated 3 years ago
- This toll is For Kali Linux. This is powerful tool that can connect your whole pc with tor network. Forgot the Tor Browser. Now you can u…☆31Oct 3, 2025Updated 6 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- A library to modify another program's memory on linux x64.☆16Sep 10, 2025Updated 7 months ago
- A lightweight and simple directory buster.☆16Sep 9, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆16Dec 18, 2021Updated 4 years ago
- Flipper Zero File Database☆21Dec 11, 2024Updated last year
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 4 years ago
- An interactive bash script for detecting IDOR vulnerabilities. Automates the discovery of access control issues in web applications, enha…☆15Apr 10, 2025Updated last year
- ☆24Dec 3, 2025Updated 4 months ago
- ☆12Apr 18, 2024Updated 2 years ago
- SQL Detector Tool In Go Language☆22Jan 10, 2023Updated 3 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- Jok3r - Network and Web Pentest Framework☆17Apr 21, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- NOGO is a packaging script that creates fully undetectable payloads specializing in disabling anti-virus. Created for pentesting (crippli…☆11Apr 23, 2019Updated 7 years ago
- ☆19Mar 28, 2023Updated 3 years ago
- These are all files from my Flipper Zero SD card. Some I use some I must test.☆29Feb 14, 2024Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆50Aug 14, 2025Updated 8 months ago
- Windows Auto Post Exploitation - For ReD Team☆15Jul 21, 2019Updated 6 years ago
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated 3 months ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Bug Bounty Setup Tools On Fresh VPS. This scripts automatically installs top bug bounty tools and set up environment in newly installed …☆31Jan 27, 2026Updated 3 months ago
- CEH Practical Preparation☆12Oct 2, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Tools for Pentesting that all hacker need....☆17Aug 26, 2022Updated 3 years ago
- [Phishing Tool]☆17Jul 18, 2025Updated 9 months ago
- Start your journey with Bug Bounty.☆15Oct 12, 2022Updated 3 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆25Jan 29, 2024Updated 2 years ago
- HackGPT Enterprise is a production-ready, cloud-native AI-powered penetration testing platform designed for enterprise security teams. It…☆814Feb 14, 2026Updated 2 months ago
- A multi-client reverse shell that allows multiple connections from target computers☆18Oct 25, 2025Updated 6 months ago
- Open-source Discord RAT (Remote Access Trojan) controlled directly from your own server.☆13Nov 24, 2024Updated last year