jbarcia / kali_setupLinks
☆13Updated 7 years ago
Alternatives and similar repositories for kali_setup
Users that are interested in kali_setup are comparing it to the libraries listed below
Sorting:
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆97Updated 5 years ago
- Linux setup tool for Kali Linux☆80Updated 7 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Updated 5 years ago
- ☆47Updated 10 years ago
- Smoking Linux Every Day!☆56Updated 5 years ago
- This is a pack of Cortana scripts commonly used on our pentests.☆70Updated 11 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 10 years ago
- Reconnaissance scripts for penetration testing☆59Updated 10 years ago
- Automatically performs the SMB relay attack☆73Updated 9 years ago
- ssh session type for metasploit☆101Updated 3 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Updated 8 years ago
- Custom stagers with python encrypting proxy☆40Updated 10 years ago
- SMB Relay Attack Script☆146Updated 7 years ago
- collection of pentest tools☆25Updated 6 years ago
- One-off scripts☆52Updated 8 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆57Updated 7 years ago
- tools for analyzing strings from password lists☆58Updated 3 years ago
- Pentest dropbox setup scripts for Kali Linux☆90Updated 9 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Search drives for documents containing passwords☆65Updated 11 years ago
- Powershell Empire Persistence finder☆119Updated 9 years ago
- ☆58Updated 5 years ago
- Cross platform (i.e., Windows, Linux, Mac) assessment script. The script helps assess workstations for vulnerabilities and abnormalities.☆19Updated 10 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Updated 9 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Bash Bunny fun!☆53Updated 7 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 9 years ago
- A ton of helpful tools☆39Updated 4 years ago
- Metasploit automation. Why work when a minion can do it?☆21Updated 8 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 12 years ago