cycurity / the-boxLinks
A tool box with 174 useful and common Linux tools for penetration testing and security audits.
β16Updated 2 years ago
Alternatives and similar repositories for the-box
Users that are interested in the-box are comparing it to the libraries listed below
Sorting:
- Pentesting Mobile apps and resources www.sniferl4bs.comβ39Updated 4 years ago
- π₯Ready, Aim, Fire.π₯β18Updated 3 years ago
- Kali Nethunter for OnePlus 3T & MI9Tβ48Updated 3 years ago
- Advance Google Dorker and Vulnerability Scannerβ49Updated 7 years ago
- Arkhota, a web brute forcer for Android.β19Updated 2 years ago
- HacKing Tools Downloader: Downloading HacKing Tools and exporting by categories to $HOME directoryβ86Updated 3 years ago
- Advanced information gathering & OSINT framework for phone numbersβ67Updated 3 months ago
- Arcane is a simple script designed to backdoor iOS packages (iphone-arm) and create the necessary resources for APT repositories.β155Updated 5 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)β19Updated 3 years ago
- Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming languagβ¦β49Updated last year
- Simple script to download some missing tools in Kaliβ33Updated 5 years ago
- Proof of concept denial of service over TOR stress test toolβ42Updated 7 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.β86Updated 11 months ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security hβ¦β13Updated 4 years ago
- βοΈ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntingβ14Updated 3 years ago
- AutoKali automatically installs useful programs and scripts for recon, enumeration and exploitation for Kali Linux that aren't included bβ¦β18Updated 2 years ago
- pwndb is a tool that looks for leaked passwords from a dark web breach database given a user or domain.β36Updated 5 years ago
- Automated Pentest Recon Scannerβ14Updated 8 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!β72Updated 2 years ago
- Keylogger using pynput + mail senderβ55Updated 5 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standβ¦β92Updated 3 months ago
- Information gathering tool - OSINTβ37Updated 6 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Pythonβ55Updated 5 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )β33Updated 6 years ago
- The hacker technical cheat sheetβ43Updated 5 months ago
- Repository of tools used in my blogβ51Updated last year
- BEST HACKING TOOLS..For more tools visit our blog for Hackersβ139Updated 2 months ago
- Customized Password/Passphrase List inputting Target Infoβ97Updated last year
- XDROID is android all in one hack toolsβ39Updated 4 months ago
- Wordlist creator written in C to generate all possibilities of passwordsβ22Updated 7 years ago