offensive-security / kali-sly-piView external linksLinks
kali-sly-pi
☆36Apr 24, 2019Updated 6 years ago
Alternatives and similar repositories for kali-sly-pi
Users that are interested in kali-sly-pi are comparing it to the libraries listed below
Sorting:
- EM4x RFID Harvester using a Robotics Connection reader☆16Sep 27, 2012Updated 13 years ago
- ☆38Apr 24, 2019Updated 6 years ago
- gcc-arm-eabi-linaro-4.6.2☆26Apr 24, 2019Updated 6 years ago
- Kali Linux u-boot images☆31Apr 24, 2019Updated 6 years ago
- gcc-arm-linux-gnueabihf-4.7/☆33Apr 24, 2019Updated 6 years ago
- Kali Linux Windows App chroot builder script☆47Apr 24, 2019Updated 6 years ago
- Various Wireless Driver patches☆34Apr 24, 2019Updated 6 years ago
- Various Proxmark3 Mods☆58Sep 24, 2012Updated 13 years ago
- ☆49Apr 24, 2019Updated 6 years ago
- ☆48Nov 28, 2016Updated 9 years ago
- Various Kali Scripts☆60Dec 20, 2016Updated 9 years ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆93Apr 24, 2019Updated 6 years ago
- Kali Linux NetHunter utils package☆113Apr 25, 2019Updated 6 years ago
- Reliable Teensy Penetration Testing Payload☆183Sep 17, 2012Updated 13 years ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆188Apr 24, 2019Updated 6 years ago
- NetHunter Devices☆268Apr 25, 2019Updated 6 years ago
- SlyPI☆20Jun 13, 2013Updated 12 years ago
- The Nethunter Linux Root Toolkit is a collection of bash scripts which install Nethunter onto a supported device.☆321Apr 25, 2019Updated 6 years ago
- MASSCAN Web UI☆502Oct 26, 2022Updated 3 years ago
- Kali Linux Recipes☆717May 1, 2019Updated 6 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- Front-end for debuggers and disassemblers☆17May 12, 2015Updated 10 years ago
- A way to force your wifi-pineapple to use SSL☆14Jul 26, 2017Updated 8 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Jan 25, 2018Updated 8 years ago
- Kali Linux ARM build scripts☆918Apr 30, 2019Updated 6 years ago
- kalibrate-bladeRF☆51Aug 3, 2021Updated 4 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- Axis2 RPC Shell☆15Sep 10, 2015Updated 10 years ago
- Dumps TCP packets☆20Jan 8, 2018Updated 8 years ago
- Metasploit Framework☆19Apr 6, 2020Updated 5 years ago
- Php Codz Hacking☆21Sep 5, 2015Updated 10 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 14 years ago
- Because I can't find scripts to do this anywhere else...☆26Dec 27, 2016Updated 9 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Nov 15, 2019Updated 6 years ago