gh0x0st / Secure_KaliLinks
How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports or launch attacks against your apache web server and more
☆85Updated 5 years ago
Alternatives and similar repositories for Secure_Kali
Users that are interested in Secure_Kali are comparing it to the libraries listed below
Sorting:
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 4 years ago
- Automated rogue access point setup tool.☆199Updated 4 years ago
- Scripts to set up Kali Linux with additional tools, and maintain them.☆67Updated last month
- Collection of extra pentest tools for Kali Linux☆113Updated 4 months ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- ☆43Updated 4 years ago
- OSCP Notes written from PWK Course☆52Updated 4 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆92Updated 3 months ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆34Updated 5 years ago
- Customized Password/Passphrase List inputting Target Info☆97Updated last year
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- A WLAN red team framework.☆155Updated last year
- Install popular tools used while pentesting & playing labs☆13Updated 4 years ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆74Updated 4 years ago
- My documentation and tools for learn ethical hacking.☆145Updated 2 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Updated 6 years ago
- For Interview, OSCP proof of concept code during the course.☆16Updated 6 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆89Updated 6 years ago
- Subdomain Bruteforce - Bounty Quick Code☆31Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆82Updated 5 years ago
- List of Github repositories and articles with list of dorks for different search engines☆32Updated 3 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Updated 4 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆120Updated 2 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆64Updated 2 years ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 4 years ago
- Generate common Reverse Shells for Pentesting☆43Updated 4 years ago