A guide to using Kali Linux tools for web penetration testing, ethical hacking, forensics, and bug bounty. Covers setup, key tools, methodologies, and best practices. Optimized for security professionals.
☆80Mar 12, 2026Updated 3 weeks ago
Alternatives and similar repositories for Kali-Linux
Users that are interested in Kali-Linux are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My personal research on quantum mechanics and quantum computing.☆15Feb 25, 2026Updated last month
- Explore free, self-hostable network services & web apps: email, file sharing, CMS, and more. Includes setup guides and Docker support for…☆13Mar 4, 2025Updated last year
- A collection of advanced Python scripts for cybersecurity, penetration testing, and ethical hacking.☆108Feb 25, 2026Updated last month
- This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in …☆798Feb 3, 2026Updated 2 months ago
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Cybersecurity and Hacking tools made by Python☆13Jan 15, 2022Updated 4 years ago
- A library used to detect vanishing points and camera parameters from an image.☆10Apr 20, 2018Updated 7 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 10 months ago
- The state of the art network attack and monitoring framework.☆17Mar 5, 2018Updated 8 years ago
- Detection for CVE-2025-61882 & CVE-2025-61884☆36Oct 14, 2025Updated 5 months ago
- Want .uf2 files for your switch hacking needs? ask and link to the .bin payload you want, and I may get to it in my free time. I understa…☆18Feb 4, 2021Updated 5 years ago
- A tool designed to analyse email headers☆40Oct 4, 2022Updated 3 years ago
- This toll is For Kali Linux. This is powerful tool that can connect your whole pc with tor network. Forgot the Tor Browser. Now you can u…☆30Oct 3, 2025Updated 6 months ago
- A library to modify another program's memory on linux x64.☆16Sep 10, 2025Updated 7 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A lightweight and simple directory buster.☆16Sep 9, 2023Updated 2 years ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆16Dec 18, 2021Updated 4 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 4 years ago
- An interactive bash script for detecting IDOR vulnerabilities. Automates the discovery of access control issues in web applications, enha…☆15Apr 10, 2025Updated last year
- ☆12Apr 18, 2024Updated last year
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated 2 months ago
- ☆24Dec 3, 2025Updated 4 months ago
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆18Oct 11, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆48Aug 14, 2025Updated 7 months ago
- NOGO is a packaging script that creates fully undetectable payloads specializing in disabling anti-virus. Created for pentesting (crippli…☆11Apr 23, 2019Updated 6 years ago
- Jok3r - Network and Web Pentest Framework☆17Apr 21, 2019Updated 6 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated 2 months ago
- Bug Bounty Setup Tools On Fresh VPS. This scripts automatically installs top bug bounty tools and set up environment in newly installed …☆31Jan 27, 2026Updated 2 months ago
- CEH Practical Preparation☆12Oct 2, 2022Updated 3 years ago
- [Phishing Tool]☆17Jul 18, 2025Updated 8 months ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆24Jan 29, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Quickly create a list of dorks based on variables entered.☆18Mar 7, 2026Updated last month
- CEH v13 exam resources & Tips☆38Jun 24, 2025Updated 9 months ago
- Okadminfinder rewrite by Xnuvers007☆16Apr 13, 2021Updated 4 years ago
- 🕹️ Enter a command with OLED Joystick ▶️ Run + Display output on OLED Screen (Works with P4wnP1!)☆18Dec 23, 2021Updated 4 years ago
- Analysis Plugin and Tools for Vivisect☆21Dec 1, 2025Updated 4 months ago
- 🔥Ready, Aim, Fire.🔥☆18Jun 3, 2022Updated 3 years ago
- This tool serves to add the kali linux repository to the ubuntu repository instantly. So that ubuntu users can install some of the tools …☆19Apr 16, 2022Updated 3 years ago