lamanihani / kali-fixerLinks
script helps you in solving most of the problems of Kali linux
☆23Updated 7 years ago
Alternatives and similar repositories for kali-fixer
Users that are interested in kali-fixer are comparing it to the libraries listed below
Sorting:
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆30Updated 7 years ago
- pentesting tool for noob hackers.Runs on linux and termux☆67Updated 4 years ago
- Hacking Tools☆50Updated 7 years ago
- Yahoo, Gmail and Hotmail Accounts Cracker☆38Updated 10 years ago
- Clone a voice in 5 seconds to generate arbitrary speech in real-time☆18Updated 5 years ago
- hashcrack is a python script which uses online hash crackers to find cleartext of a hash in less than 3 seconds☆47Updated 7 years ago
- OSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accu…☆21Updated 4 years ago
- Hacking Tools For All Debian-based OS☆50Updated 7 years ago
- M-dork, google dorking with mdork☆57Updated 6 years ago
- Silently logs and E-mails all incoming/outgoing calls and text messages while doubling up as a flashlight app. The app also has the abili…☆23Updated 4 years ago
- Facebook phisher to get password and email of victim.☆29Updated 7 years ago
- sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking o…☆28Updated 7 years ago
- Password Attack Toolkit☆16Updated 7 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆46Updated 3 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆57Updated 7 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 5 years ago
- Priv8 Image Capturing through Network Based On Driftnet☆24Updated 7 years ago
- Run interactive android exploits in linux.☆146Updated 8 months ago
- ☆20Updated 4 years ago
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆50Updated 4 years ago
- Python Security/Hacking Kit☆47Updated 5 years ago
- ☆32Updated 9 years ago
- WIP - Chromium plugin for PhoneInfoga's Google Search scanner☆83Updated 4 years ago
- Paypal phishing tool☆30Updated 7 years ago
- Best Google Dorker Available☆39Updated last year
- Text messages (SMS) for two-factor authentication, generating all possible/likely codes☆14Updated 6 years ago
- BlueHunter is bluetooth device hacking framework☆23Updated last year
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆19Updated 3 years ago
- ☆32Updated last year
- The EVIL EMAIL/SMS BOMBER is made for research and testing purposes only. Prank your friends. EVIL EMAIL/SMS BOMBER can send bulk mail …☆46Updated 4 years ago