The Kali NetHunter Project
☆3,751Apr 25, 2019Updated 6 years ago
Alternatives and similar repositories for kali-nethunter
Users that are interested in kali-nethunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NetHunter android application☆338Apr 25, 2019Updated 6 years ago
- NetHunter Devices☆270Apr 25, 2019Updated 6 years ago
- The Nethunter Linux Root Toolkit is a collection of bash scripts which install Nethunter onto a supported device.☆320Apr 25, 2019Updated 6 years ago
- Kali Linux NetHunter utils package☆116Apr 25, 2019Updated 6 years ago
- Kali Linux Recipes☆734May 1, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Kali Linux ARM build scripts☆919Apr 30, 2019Updated 6 years ago
- This is a script by which you can install Kali nethunter (Kali Linux) in your termux application without rooted phone☆2,999Dec 7, 2024Updated last year
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,854Nov 10, 2022Updated 3 years ago
- kali_nethunter☆187Nov 27, 2021Updated 4 years ago
- Automatically install all Kali linux tools☆5,224Apr 29, 2024Updated last year
- KaliNethunter☆396Nov 19, 2022Updated 3 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,266Dec 18, 2021Updated 4 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb-bin-sploits☆1,819Nov 10, 2022Updated 3 years ago
- Metasploit Framework☆37,906Updated this week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Various Kali Scripts☆61Dec 20, 2016Updated 9 years ago
- Various Wireless Driver patches☆35Apr 24, 2019Updated 6 years ago
- cSploit - The most complete and advanced IT security professional toolkit on Android.☆3,592Apr 27, 2024Updated last year
- Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android☆2,522Aug 26, 2020Updated 5 years ago
- Framework for Man-In-The-Middle attacks☆3,634Aug 28, 2018Updated 7 years ago
- Converts a USB Rubber ducky script into a Kali Nethunter friendly format for the HID attack☆146Feb 12, 2015Updated 11 years ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆188Apr 24, 2019Updated 6 years ago
- kali-sly-pi☆36Apr 24, 2019Updated 6 years ago
- Some usefull scripts for KaliLinux☆474Aug 26, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,097Aug 21, 2018Updated 7 years ago
- ☆3,618Sep 8, 2022Updated 3 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,154Apr 18, 2020Updated 5 years ago
- Experimental, yet stable new installer for Nethunter - find prebuilt zips at☆31Feb 21, 2017Updated 9 years ago
- ☆49Apr 24, 2019Updated 6 years ago
- ☆39Apr 24, 2019Updated 6 years ago
- MASSCAN Web UI☆505Oct 26, 2022Updated 3 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,497Feb 27, 2018Updated 8 years ago
- Kali Linux Windows App chroot builder script☆47Apr 24, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An easy way to patch ramdisks, replace kernels, and install files to your phone through recovery.☆236Nov 12, 2019Updated 6 years ago
- Exploitation Framework for Embedded Devices☆13,066Mar 2, 2026Updated last month
- EM4x RFID Harvester using a Robotics Connection reader☆16Sep 27, 2012Updated 13 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,516Feb 13, 2025Updated last year
- The Rogue Access Point Framework☆14,531Feb 4, 2025Updated last year
- Empire is a PowerShell and Python post-exploitation agent.☆7,836Jan 19, 2020Updated 6 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,763Oct 21, 2024Updated last year