offensive-security / term-nhLinks
☆23Updated 6 years ago
Alternatives and similar repositories for term-nh
Users that are interested in term-nh are comparing it to the libraries listed below
Sorting:
- Various Wireless Driver patches☆34Updated 6 years ago
- EM4x RFID Harvester using a Robotics Connection reader☆16Updated 13 years ago
- Kali Linux Windows App chroot builder script☆46Updated 6 years ago
- Kali Linux u-boot images☆30Updated 6 years ago
- ☆47Updated 6 years ago
- ☆38Updated 6 years ago
- Various Kali Scripts☆58Updated 8 years ago
- Various Proxmark3 Mods☆58Updated 13 years ago
- kali-sly-pi☆35Updated 6 years ago
- gcc-arm-linux-gnueabihf-4.7/☆33Updated 6 years ago
- Kali Linux NetHunter utils package☆113Updated 6 years ago
- Package manager for hackers built by hackers☆37Updated 7 years ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆93Updated 6 years ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Updated 2 weeks ago
- Pentesting Hacking Tools, Scripts, Windows, Linux,☆29Updated 9 years ago
- Tweaks to run Kali Linux desktop panels and gui apps on Windows 10☆128Updated 2 years ago
- CDPSnarf is a network sniffer exclusively written to extract information from CDP (Cisco Discovery Protocol) packets.☆42Updated 15 years ago
- Interface for the Shodan Computer Search Engine API☆25Updated 5 years ago
- Run Kali tools on all distributions. Offline search, including in package descriptions.☆108Updated 7 years ago
- Devploit v 1.1 Information Gathering Tool☆33Updated 7 years ago
- gcc-arm-eabi-linaro-4.6.2☆26Updated 6 years ago
- A graphical user interface for the medusa brute forcing utility. http://wiki.taksmind.com//index.php?title=Medusa-gui☆40Updated 7 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- Multi-threaded web application directory bruteforcer☆28Updated 6 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 7 years ago
- Trying to be the best tool to search for exploits in the terminal.☆20Updated 3 years ago
- Dracos Linux ( www.dracos-linux.org ) is the Linux operating system from Indonesian☆59Updated 3 years ago
- Attacking WPA/WPA encrypted access point without client.☆50Updated 11 years ago
- Hacking tools resources☆33Updated 11 years ago
- Autosploit = Automating Metasploit Modules.☆79Updated 6 years ago