aw-junaid / Kali-LinuxLinks
A guide to using Kali Linux tools for web penetration testing, ethical hacking, forensics, and bug bounty. Covers setup, key tools, methodologies, and best practices. Optimized for security professionals.
☆40Updated 5 months ago
Alternatives and similar repositories for Kali-Linux
Users that are interested in Kali-Linux are comparing it to the libraries listed below
Sorting:
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆187Updated 4 months ago
- DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others T…☆160Updated last year
- The best WiFi spy avalaible for hire! Made for hackers, for hackers☆224Updated 6 years ago
- Advance OTP Bypass Tool. Termux Supported.☆94Updated 7 months ago
- This tool will generate a virus that can only destroy Windows computer. You can also configure to auto run in usb drive☆279Updated 8 months ago
- Bash For Ethical Hacking☆72Updated 2 years ago
- Labsecurity is a tool that bundles ethical hacking python scripts into a single tool with cli interface.☆64Updated 2 years ago
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆75Updated 2 years ago
- WebSift is an OSINT ethical hacking tool designed to scrape and extract emails, phone numbers, and social media links or other URLs from …☆163Updated 3 weeks ago
- Redirect All Traffic Through Tor Network For Kali Linux☆202Updated 6 months ago
- "Essential Kali Linux commands for ethical hackers and penetration testers."☆107Updated 2 years ago
- fsociety is a penetration toolkit inspired from MR. ROBOT☆97Updated 10 months ago
- An Excellent OSINT tool to get information of any ip address. All details are explained in below screenshot☆260Updated 11 months ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆24Updated 2 years ago
- A tool for automatically change the Tor IP address over time.☆99Updated 6 months ago
- An automated phishing tool with templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse…☆106Updated 2 years ago
- Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Program…☆122Updated 11 months ago
- PIP-INTEL is an OSINT (Open Source Intelligence) tool designed using various open-source tools and pip packages.☆182Updated last year
- SubnetWizard is a Python Based CLI tools for subnet calculating☆55Updated last year
- GRIM IS A INFORMATION GATHERER AND VULNERABILITY TESTER TOOL, YOU CAN USE IT ON ANY WEBSITE FOR GETTING ITS INFORMATION☆112Updated 4 years ago
- A social engineering toolkit for performing smishing, and other sms attacks☆100Updated last year
- Algorithm identification tool on hashes☆47Updated 2 years ago
- HacKingPro - Hack Like A Pro !☆138Updated 11 months ago
- View data of a WhatsApp number, including its status, photo, etc. 🕵🏽♂️☆75Updated last month
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆58Updated 2 years ago
- Evil Eye is a tool of python based program for simple audio steganography.☆60Updated 3 years ago
- A social engineering tool designed to seamlessly locate profiles using usernames while offering convenient reverse image search functiona…☆118Updated last year
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆98Updated 2 years ago
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆90Updated 5 months ago
- X-snifer is a versatile tool designed for scanning and gathering information from a website and simplifying various website analysis and …☆81Updated 7 months ago