b-ramsey / homebrew-kali
A Homebrew Tap for Kali Linux tools on OS X
β149Updated 4 years ago
Related projects: β
- All my Hacking|Pentesting Notesβ281Updated 8 years ago
- πΊ Red Team Hardware Toolkit πΊβ311Updated 4 years ago
- Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.β206Updated 2 years ago
- Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. ππ»β183Updated last year
- Configure Your Macbook For Blackhatβ166Updated 6 years ago
- OWASP D4N155 - Intelligent and dynamic wordlist using OSINTβ223Updated 3 months ago
- BurpSuite Pro, Plugins and Payloadsβ113Updated 4 years ago
- π shodansploit > v1.3.0β519Updated last year
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.β274Updated last year
- One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here Iβll outline the different API keys it cβ¦β162Updated 6 years ago
- Tools, scripts and tips useful during Penetration Testing engagements.β606Updated 3 months ago
- Pentesting Cheatsheets and Guidesβ123Updated 7 years ago
- Personal compilation of wordlists & dictionaries for everything. Users, passwords, directories, files, vulnerabilities, fuzzing, injectioβ¦β254Updated 4 years ago
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Pythonβ196Updated 2 years ago
- Penetration Testing/Security Cheatsheetsβ173Updated 5 years ago
- Custom Tools and Notes from my own Penetration Testing Experienceβ271Updated 9 months ago
- Python 3.5+ DNS asynchronous brute force utilityβ638Updated 10 months ago
- Fetch, install and search wordlist archives from websites and torrent peers.β489Updated 5 months ago
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.β414Updated 4 years ago
- Hydra Password Cracking Cheetsheetβ370Updated 3 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types iβ¦β91Updated this week
- An OSINT tool to find contacts in order to report security vulnerabilities.β266Updated 4 years ago
- Instructions on how to create your very own Pwnbox, originally created by HTBβ382Updated last year
- Note: Going through a full re-write of the tooling so the current versions in the repo do not work!β397Updated 4 years ago
- Python API wrapper and command-line client for the tools hosted on spyse.com.β265Updated 4 years ago
- DMitry (Deepmagic Information Gathering Tool)β194Updated 2 months ago
- Blazing fast admin panel finder with asyncio and aiohttpβ216Updated 2 years ago
- Does some google dorks against a domainβ157Updated 4 years ago
- List of commands and techniques to while conducting any kind of hacking :)β114Updated 11 months ago
- Single Page Cheatsheet for common MSF Venom One Linersβ235Updated 5 years ago