A script that I made to get the essentials I use for various reasons on Kali Linux.
☆55Jan 22, 2023Updated 3 years ago
Alternatives and similar repositories for the-essentials
Users that are interested in the-essentials are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kali Linux Fixes for Newly Imported VM's☆2,402Jun 30, 2025Updated 8 months ago
- A quick script to install google on linux☆22Jan 23, 2022Updated 4 years ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆17Jan 23, 2025Updated last year
- This tool scans random SSH servers around the world and it tests the most used passwords☆14Dec 26, 2022Updated 3 years ago
- A compilation of customizations for Debian-based Linux distrubutions (mostly Pop!_OS and Kali Linux) and (finally) a mostly automated scr…☆18Jan 1, 2026Updated 2 months ago
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆70Feb 25, 2026Updated 3 weeks ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23May 31, 2020Updated 5 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆28Oct 3, 2025Updated 5 months ago
- Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR/MS-RPRN and S…☆11Apr 9, 2022Updated 3 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆46Feb 27, 2024Updated 2 years ago
- ☆16Jun 16, 2021Updated 4 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- i3 for kali-linux 1 shot setup configs included☆11Sep 1, 2023Updated 2 years ago
- ☆28Mar 25, 2021Updated 4 years ago
- Store my 'Useful Commands' for HTB/OSCP and additional notes from my Obisidan. Merge into Obsidian for direct formatting. Also check out …☆16Aug 16, 2023Updated 2 years ago
- Specification for the unified user data format across the various "Tube" apps (NewPipe, FreeTube, Invidious, etc..)☆20May 7, 2023Updated 2 years ago
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- Spoofcheck☆46May 21, 2025Updated 10 months ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Aug 26, 2021Updated 4 years ago
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- this script for fix problem vpn on kali linux "Rooling" only :)☆11Feb 17, 2017Updated 9 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Jul 27, 2019Updated 6 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 8 years ago
- threejs risk-based heatmap☆12Aug 1, 2023Updated 2 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- ☆27Aug 5, 2019Updated 6 years ago
- SQLI labs to test error based, Blind boolean based, Time based.☆17Feb 1, 2019Updated 7 years ago
- FAQ Guide for Practical Ethical Hacking Udemy Course☆190Apr 26, 2020Updated 5 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Feb 10, 2021Updated 5 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Feb 16, 2021Updated 5 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Mar 5, 2021Updated 5 years ago
- ☆41Feb 25, 2026Updated 3 weeks ago
- ☆31Jul 26, 2024Updated last year
- ☆23Jul 28, 2020Updated 5 years ago