gh0x0st / Secure_KaliLinks
How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports or launch attacks against your apache web server and more
☆85Updated 4 years ago
Alternatives and similar repositories for Secure_Kali
Users that are interested in Secure_Kali are comparing it to the libraries listed below
Sorting:
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆150Updated 4 years ago
- Collection of extra pentest tools for Kali Linux☆112Updated 2 months ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- Automated rogue access point setup tool.☆201Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Scripts to set up Kali Linux with additional tools, and maintain them.☆68Updated 2 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 5 years ago
- A WLAN red team framework.☆154Updated last year
- ☆44Updated 4 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆98Updated 2 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- Customized Password/Passphrase List inputting Target Info☆96Updated last year
- Subdomain Bruteforce - Bounty Quick Code☆32Updated last year
- OSCP Notes written from PWK Course☆52Updated 4 years ago
- Internal Network Penetration Test Playbook☆20Updated 4 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆93Updated 2 months ago
- Install popular tools used while pentesting & playing labs☆13Updated 4 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- A script that I made to get the essentials I use for various reasons on Kali Linux.☆56Updated 2 years ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 6 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆13Updated 5 years ago
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆28Updated 4 years ago
- A tool that automates the process of enumeration☆31Updated 5 years ago
- List of Github repositories and articles with list of dorks for different search engines☆32Updated 3 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆118Updated 2 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆96Updated 4 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆23Updated 2 years ago
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated last year