🐧 Security-focused Linux distribution with 140+ tools, custom kernel 6.17.13, AI assistant | 5 editions | Cloud, AI/ML, Automotive, Hardware hacking
☆36Mar 18, 2026Updated this week
Alternatives and similar repositories for nullsec-linux
Users that are interested in nullsec-linux are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2025-68428 Proof of Concept☆24Jan 8, 2026Updated 2 months ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated 3 weeks ago
- Password Manager with client-side encryption☆15Mar 28, 2024Updated last year
- Keyboard‑driven terminal app to view and manage users and groups. Browse accounts, see memberships, search, and make common changes: rena…☆24Nov 11, 2025Updated 4 months ago
- A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32☆16Feb 24, 2025Updated last year
- ☆26Jan 31, 2024Updated 2 years ago
- A python script file to decrypt encrypted IEE (802.11) Radio .pcap files captured via Wireshark for extraction and analyse.☆10Sep 8, 2019Updated 6 years ago
- A component to implement privacy by design in your PHP project.☆19Oct 14, 2021Updated 4 years ago
- how to hack pattern lock☆15Dec 27, 2020Updated 5 years ago
- A powerful hardware ID spoofing tool designed to modify system identifiers for privacy and security purposes. Change MAC addresses, HWID,…☆42Mar 9, 2026Updated 2 weeks ago
- Hijacker for Linux Phones☆17Jul 16, 2025Updated 8 months ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- RRG Android App for use with Proxmark3 RDV4 and the blueshark addon☆17Oct 26, 2020Updated 5 years ago
- Scripts and Tips for Kali Linux Pi-Tail Edition☆11Dec 8, 2023Updated 2 years ago
- Bluetooth rubberducky, Keyboard & Mouse Emulator for Kali NetHunter and NetHunter Pro☆15Nov 30, 2025Updated 3 months ago
- Remote Sniffer: Tool for sending sniffered PCAP traffic in realtime into Winows/PC box with GUI Wireshark☆14Jul 9, 2020Updated 5 years ago
- An all-in-one Lsposed module to spoof all things networking (including eSIM compatibility)!☆36Mar 7, 2026Updated 2 weeks ago
- FOMU keystroke injector☆12Aug 7, 2023Updated 2 years ago
- AI-powered offensive security agent. Autonomous pentesting with 13+ specialized agents, 120+ OWASP test cases, 15+ LLM providers, and Bol…☆89Updated this week
- Facilitates the indexing of content from a CSV into ElasticSearch☆27Oct 3, 2013Updated 12 years ago
- the main target of that project is to build a powerful and highly flexible android universal boot loader. with "universal" i mean that it…☆34Nov 4, 2013Updated 12 years ago
- ☆16Oct 12, 2017Updated 8 years ago
- ☆11Sep 3, 2024Updated last year
- Automated installation of Zimbra☆18Dec 10, 2024Updated last year
- A simple, secure, cloud-based password manager.☆30Jul 24, 2017Updated 8 years ago
- Node module that abstracts the HID communication with the ArcticFox Firmware☆13Sep 24, 2017Updated 8 years ago
- In this workshop, you will learn how to build a machine learning model using Python/Scikit-Learn, turn the model into an API using Python…☆23Updated this week
- VPN & IP Changer☆10Aug 6, 2024Updated last year
- API Management built for developers☆37Mar 17, 2026Updated last week
- A Windows automation bot for Clash of Clans that can record attack sessions and replay them automatically with AI-powered base analysis.☆75Jul 18, 2025Updated 8 months ago
- Ready made ducky scripts to use in nethunter Duckhunter HID attack to perform bad usb attack right at your fingertips.☆12Nov 25, 2025Updated 3 months ago
- Beginner Road map that paves the way for your journey into the captivating world of cyber security based on job roles.☆25Jan 27, 2024Updated 2 years ago
- Linux kernel source code for Galaxy S22. Extracted from SM-S901U_NA_12_Opensource.zip☆15Oct 7, 2022Updated 3 years ago
- Passive Network Mapper - like nmap, but passive☆25Oct 3, 2025Updated 5 months ago
- OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations☆21Jul 4, 2017Updated 8 years ago
- Configure NTP for server using recommended chronyd.☆20Mar 13, 2026Updated last week
- Subdomain discovery using Sublist3r, certspotter, crt.sh , censys and amass . Subdomain bruteforcing using Gobuster and Resolve hosts usi…☆16Oct 8, 2024Updated last year
- Automated Wifi Hacking Tool☆12Mar 16, 2021Updated 5 years ago
- Sharer developed in VB.NET framework can turn a Windows notebook equipped with a shareable wireless network card into a WiFi transmitter;…☆20Apr 11, 2025Updated 11 months ago