A script that I made to get the essentials I use for various reasons on Kali Linux.
☆55Jan 22, 2023Updated 3 years ago
Alternatives and similar repositories for the-essentials
Users that are interested in the-essentials are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A quick script to install google on linux☆22Jan 23, 2022Updated 4 years ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆18Jan 23, 2025Updated last year
- A compilation of customizations for Debian-based Linux distrubutions (mostly Pop!_OS and Kali Linux) and (finally) a mostly automated scr…☆18Jan 1, 2026Updated 3 months ago
- This tool scans random SSH servers around the world and it tests the most used passwords☆15Dec 26, 2022Updated 3 years ago
- Aliases and functions for the lazy penetration tester☆69Jan 28, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23May 31, 2020Updated 5 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆28Oct 3, 2025Updated 6 months ago
- Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR/MS-RPRN and S…☆11Apr 9, 2022Updated 4 years ago
- ☆16Jun 16, 2021Updated 4 years ago
- Extra cmdlets to help with quering security related information from Azure☆15Sep 16, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Jul 29, 2024Updated last year
- i3 for kali-linux 1 shot setup configs included☆11Sep 1, 2023Updated 2 years ago
- ☆28Mar 25, 2021Updated 5 years ago
- Getting Started with ELK☆50Dec 23, 2015Updated 10 years ago
- Convert asciinema JSON files to GIF for embedding in Github, Medium, email, Slack and more!☆10Sep 24, 2020Updated 5 years ago
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- Spoofcheck☆46May 21, 2025Updated 10 months ago
- Generate 1337speak based password dictionaries☆12Jul 27, 2018Updated 7 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Apr 1, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Jul 27, 2019Updated 6 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 8 years ago
- threejs risk-based heatmap☆12Aug 1, 2023Updated 2 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- SQLI labs to test error based, Blind boolean based, Time based.☆17Feb 1, 2019Updated 7 years ago
- FAQ Guide for Practical Ethical Hacking Udemy Course☆190Apr 26, 2020Updated 5 years ago
- Script to run after a Debian based install (Ubuntu, Kali, Raspberry Pi...)☆10Sep 20, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Remove Offensive and Profane Words from Wordlists☆16Jul 27, 2023Updated 2 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Feb 16, 2021Updated 5 years ago
- Code for the solutions of practical reverse engineering☆23Jan 17, 2020Updated 6 years ago
- Python script for extracting and decrypting Group Policy Preferences passwords☆26May 28, 2021Updated 4 years ago
- Websocket communications with Push and Poll messages☆20Oct 26, 2025Updated 5 months ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- A remake of iRecovery based off the syringe library.☆27Apr 11, 2011Updated 15 years ago