hackervegas001 / blackbuntu-new-osLinks
Official repository of the Blackbuntu pentesting distribution
☆12Updated 2 years ago
Alternatives and similar repositories for blackbuntu-new-os
Users that are interested in blackbuntu-new-os are comparing it to the libraries listed below
Sorting:
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆35Updated 5 years ago
- ☆34Updated 8 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆47Updated 2 years ago
- ☆32Updated last year
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victim…☆16Updated 5 years ago
- The Advanced Automated Pen testing And Forensics Tool NoJle built using python it's for lazy hackers to automate most used Linux commands…☆42Updated 3 years ago
- Automated Password Cracking Tool☆17Updated 4 years ago
- This is useful if you are running an investigation to determine the usage of the same username on different social networks.☆12Updated 4 years ago
- contains Evil Files separated from PyHTools project to comply with PyPi's acceptable use policy☆15Updated this week
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆55Updated 7 years ago
- This repo contains tools that hackers use for penetration testing and web hacking, DNS spoofing, MiTM, malware and more. It's made easy j…☆20Updated 3 years ago
- This tool is uses for SQLI+LFI+XSS+LFI+RCE Dorking and finding vulnerable sites.☆33Updated 6 years ago
- SHELL SCANNER☆19Updated 6 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆79Updated 5 months ago
- ☆22Updated 6 years ago
- Facebook bot dumper&scraper☆34Updated 8 months ago
- A Simple Script For SSH BruteForce☆36Updated last year
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- Generate HID attack strings for Kali Nethunter☆12Updated 10 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆23Updated 4 years ago
- A POC to do an Ethical Hacking Afterwork @ Sopra Steria☆8Updated 8 years ago
- Using the python programming language and its methods are almost the same as brute force☆12Updated 7 years ago
- FUD Android Payload and Listener☆19Updated 6 years ago
- ☆13Updated 4 years ago
- M0B tool v2 : exploit - brute force - website informations gathering - dork scanner with 9 search engines - full ip ports scanner - shell…☆14Updated 7 years ago
- Virus Repository☆23Updated 3 years ago
- 🔥Ready, Aim, Fire.🔥☆16Updated 3 years ago
- Complete React application of Numspy API.☆13Updated 4 years ago
- M-dork, google dorking with mdork☆57Updated 6 years ago
- BLACKBOx Penetration Testing Framework☆31Updated 6 years ago