maruos / installerLinks
Easy installers for Maru OS.
☆11Updated 6 years ago
Alternatives and similar repositories for installer
Users that are interested in installer are comparing it to the libraries listed below
Sorting:
- Forked MaruOS installer for Nethunter☆17Updated 7 years ago
- Metasploit Framework for android☆45Updated 9 years ago
- kali-sly-pi☆33Updated 6 years ago
- ARP Poisoning Defense Scripts☆38Updated 7 years ago
- ☆10Updated 10 years ago
- Debian live build for the Pocket-Kali☆42Updated 7 years ago
- ☆36Updated 6 years ago
- the core of the cSploit project☆35Updated 7 years ago
- ARP spoof then session jack within your browser☆28Updated 11 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆21Updated 10 years ago
- cSploit network radar☆31Updated 9 years ago
- Experimental, yet stable new installer for Nethunter - find prebuilt zips at☆32Updated 8 years ago
- ☆19Updated 10 years ago
- Quick script to set up VPN server and reverse VPN for Nethunter☆35Updated 9 years ago
- The all-in-one boot image tool.☆22Updated 10 years ago
- Repo For Working on Dirty Cow Based Android Root Method☆43Updated 2 years ago
- Various Kali Scripts☆56Updated 8 years ago
- hcidump for android☆10Updated 10 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- A python script for obfuscating wireless networks☆79Updated 8 years ago
- Android Data Extractor Lite☆128Updated 10 years ago
- Some NSE scripts to search information from routers☆10Updated 9 years ago
- ☆17Updated 4 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Updated 5 years ago
- bash script to help you , doing many penetration testing based on kali linux , help pentester and hackers to deal with kali linux in easy…☆17Updated 10 years ago
- aptoide app store APK download☆25Updated 10 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆107Updated 9 years ago
- Network Guardian☆12Updated 8 years ago