The Kali NetHunter Project
☆3,743Apr 25, 2019Updated 6 years ago
Alternatives and similar repositories for kali-nethunter
Users that are interested in kali-nethunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NetHunter android application☆336Apr 25, 2019Updated 6 years ago
- NetHunter Devices☆268Apr 25, 2019Updated 6 years ago
- The Nethunter Linux Root Toolkit is a collection of bash scripts which install Nethunter onto a supported device.☆319Apr 25, 2019Updated 6 years ago
- Kali Linux NetHunter utils package☆114Apr 25, 2019Updated 6 years ago
- Kali Linux Recipes☆729May 1, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Kali Linux ARM build scripts☆921Apr 30, 2019Updated 6 years ago
- This is a script by which you can install Kali nethunter (Kali Linux) in your termux application without rooted phone☆2,971Dec 7, 2024Updated last year
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,850Nov 10, 2022Updated 3 years ago
- kali_nethunter☆187Nov 27, 2021Updated 4 years ago
- Automatically install all Kali linux tools☆5,218Apr 29, 2024Updated last year
- KaliNethunter☆396Nov 19, 2022Updated 3 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,265Dec 18, 2021Updated 4 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb-bin-sploits☆1,816Nov 10, 2022Updated 3 years ago
- Metasploit Framework☆37,771Updated this week
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Various Kali Scripts☆60Dec 20, 2016Updated 9 years ago
- Various Wireless Driver patches☆34Apr 24, 2019Updated 6 years ago
- cSploit - The most complete and advanced IT security professional toolkit on Android.☆3,592Apr 27, 2024Updated last year
- Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android☆2,518Aug 26, 2020Updated 5 years ago
- Framework for Man-In-The-Middle attacks☆3,636Aug 28, 2018Updated 7 years ago
- Converts a USB Rubber ducky script into a Kali Nethunter friendly format for the HID attack☆146Feb 12, 2015Updated 11 years ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆187Apr 24, 2019Updated 6 years ago
- kali-sly-pi☆36Apr 24, 2019Updated 6 years ago
- Some usefull scripts for KaliLinux☆474Aug 26, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,096Aug 21, 2018Updated 7 years ago
- ☆3,613Sep 8, 2022Updated 3 years ago
- ☆49Apr 24, 2019Updated 6 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,158Apr 18, 2020Updated 5 years ago
- Experimental, yet stable new installer for Nethunter - find prebuilt zips at☆31Feb 21, 2017Updated 9 years ago
- ☆38Apr 24, 2019Updated 6 years ago
- MASSCAN Web UI☆504Oct 26, 2022Updated 3 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,497Feb 27, 2018Updated 8 years ago
- Kali Linux Windows App chroot builder script☆47Apr 24, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- An easy way to patch ramdisks, replace kernels, and install files to your phone through recovery.☆236Nov 12, 2019Updated 6 years ago
- Exploitation Framework for Embedded Devices☆13,028Mar 2, 2026Updated 3 weeks ago
- EM4x RFID Harvester using a Robotics Connection reader☆16Sep 27, 2012Updated 13 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,483Feb 13, 2025Updated last year
- The Rogue Access Point Framework☆14,513Feb 4, 2025Updated last year
- Empire is a PowerShell and Python post-exploitation agent.☆7,828Jan 19, 2020Updated 6 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,683Oct 21, 2024Updated last year