The Kali NetHunter Project
☆3,763Apr 25, 2019Updated 7 years ago
Alternatives and similar repositories for kali-nethunter
Users that are interested in kali-nethunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NetHunter android application☆339Apr 25, 2019Updated 7 years ago
- NetHunter Devices☆270Apr 25, 2019Updated 7 years ago
- The Nethunter Linux Root Toolkit is a collection of bash scripts which install Nethunter onto a supported device.☆319Apr 25, 2019Updated 7 years ago
- Kali Linux NetHunter utils package☆116Apr 25, 2019Updated 7 years ago
- Kali Linux Recipes☆735May 1, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Kali Linux ARM build scripts☆920Apr 30, 2019Updated 7 years ago
- This is a script by which you can install Kali nethunter (Kali Linux) in your termux application without rooted phone☆3,014Dec 7, 2024Updated last year
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,860Nov 10, 2022Updated 3 years ago
- kali_nethunter☆186Nov 27, 2021Updated 4 years ago
- Automatically install all Kali linux tools☆5,227Apr 29, 2024Updated 2 years ago
- KaliNethunter☆400Nov 19, 2022Updated 3 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,266Dec 18, 2021Updated 4 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb-bin-sploits☆1,822Nov 10, 2022Updated 3 years ago
- Metasploit Framework☆38,066Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Various Kali Scripts☆61Dec 20, 2016Updated 9 years ago
- Various Wireless Driver patches☆35Apr 24, 2019Updated 7 years ago
- cSploit - The most complete and advanced IT security professional toolkit on Android.☆3,601Apr 27, 2024Updated 2 years ago
- Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android☆2,529Aug 26, 2020Updated 5 years ago
- Framework for Man-In-The-Middle attacks☆3,639Aug 28, 2018Updated 7 years ago
- Converts a USB Rubber ducky script into a Kali Nethunter friendly format for the HID attack☆146Feb 12, 2015Updated 11 years ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆188Apr 24, 2019Updated 7 years ago
- kali-sly-pi☆36Apr 24, 2019Updated 7 years ago
- Some usefull scripts for KaliLinux☆474Aug 26, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,098Aug 21, 2018Updated 7 years ago
- ☆3,617Sep 8, 2022Updated 3 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,155Apr 18, 2020Updated 6 years ago
- Experimental, yet stable new installer for Nethunter - find prebuilt zips at☆31Feb 21, 2017Updated 9 years ago
- ☆50Apr 24, 2019Updated 7 years ago
- ☆39Apr 24, 2019Updated 7 years ago
- MASSCAN Web UI☆503Oct 26, 2022Updated 3 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,497Feb 27, 2018Updated 8 years ago
- Kali Linux Windows App chroot builder script☆47Apr 24, 2019Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An easy way to patch ramdisks, replace kernels, and install files to your phone through recovery.☆236Nov 12, 2019Updated 6 years ago
- Exploitation Framework for Embedded Devices☆13,097Mar 2, 2026Updated 2 months ago
- EM4x RFID Harvester using a Robotics Connection reader☆16Sep 27, 2012Updated 13 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,538Feb 13, 2025Updated last year
- The Rogue Access Point Framework☆14,562Feb 4, 2025Updated last year
- Empire is a PowerShell and Python post-exploitation agent.☆7,831Jan 19, 2020Updated 6 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,828Oct 21, 2024Updated last year