blacklanternsecurity / kali-setup-scriptLinks
Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes
☆148Updated 4 years ago
Alternatives and similar repositories for kali-setup-script
Users that are interested in kali-setup-script are comparing it to the libraries listed below
Sorting:
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆87Updated 5 years ago
- Offensive Security / Pentesting Cheat Sheets☆103Updated 7 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- For Interview, OSCP proof of concept code during the course.☆16Updated 6 years ago
- OSCP Notes written from PWK Course☆52Updated 4 years ago
- A WLAN red team framework.☆155Updated last week
- Collection of extra pentest tools for Kali Linux☆113Updated 4 months ago
- Scripts to set up Kali Linux with additional tools, and maintain them.☆67Updated last month
- A script that I made to get the essentials I use for various reasons on Kali Linux.☆56Updated 3 years ago
- Just a repo of random Python scripts to get pentesters started with the Python language on engagements.☆217Updated 5 years ago
- Generate common Reverse Shells for Pentesting☆43Updated 4 years ago
- Script for Kali that adds a bunch of tools and customizes it to be much better☆185Updated 5 years ago
- A collection of useful links for Pentesters☆174Updated 7 months ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆40Updated 5 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆146Updated 2 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Updated 2 years ago
- Useful Commands, Reverse Shell, Privilege Escalation Methods, Impersonation Attacks, Useful Powershell Commands and more☆123Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- ☆156Updated 2 months ago
- Short checklists for penetration testing methodology☆200Updated 2 years ago
- Automated rogue access point setup tool.☆201Updated 4 years ago
- Windows privilege escalation with cmd☆90Updated 4 years ago
- Cheat-Sheet of tools for penetration testing☆54Updated 2 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- ☆43Updated 4 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆93Updated 4 months ago