offensive-security / Kali-WSL-chroot
Kali Linux Windows App chroot builder script
☆45Updated 5 years ago
Alternatives and similar repositories for Kali-WSL-chroot:
Users that are interested in Kali-WSL-chroot are comparing it to the libraries listed below
- Various Wireless Driver patches☆32Updated 5 years ago
- Various Kali Scripts☆55Updated 8 years ago
- EM4x RFID Harvester using a Robotics Connection reader☆14Updated 12 years ago
- kali-sly-pi☆33Updated 5 years ago
- Kali Linux u-boot images☆26Updated 5 years ago
- ☆36Updated 5 years ago
- Kali Linux NetHunter utils package☆105Updated 5 years ago
- ☆22Updated 5 years ago
- gcc-arm-linux-gnueabihf-4.7/☆31Updated 5 years ago
- gcc-arm-eabi-linaro-4.6.2☆24Updated 5 years ago
- Various Proxmark3 Mods☆55Updated 12 years ago
- ☆46Updated 5 years ago
- Pentesting Hacking Tools, Scripts, Windows, Linux,☆28Updated 9 years ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆91Updated 5 years ago
- Debian live build for the Pocket-Kali☆41Updated 6 years ago
- cSploit traffic manipulator☆29Updated 7 years ago
- Kali Linux Generator its a script that automates the building process of kali linux images (iso)!!! Added compability to create Kali lin…☆34Updated 4 years ago
- Forked MaruOS installer for Nethunter☆16Updated 7 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- This is a collection of scripts to add to kali linux☆19Updated 7 years ago
- automatically crack WPA handshakes and [MD5, NTLM, MYSQL, SHA256 ....] hashes. with GPU and CPU powers.☆47Updated 8 years ago
- to grab or steal the password of systemAutomated sticky keys hack. Post exploitation it grabs browser passwords, history, and network pas…☆53Updated 7 years ago
- Metasploit Framework for android☆45Updated 9 years ago
- Fully functional Windows UAC bypass for Hak5 USB rubber ducky.☆27Updated 9 years ago
- BlackArch Linux Keyring☆21Updated 6 years ago
- ☆15Updated 7 years ago
- Reliable Teensy Penetration Testing Payload☆178Updated 12 years ago
- Automatizated bash script to invade WPA2 networks with wordlist method☆18Updated 5 years ago