offensive-security / term-nh
☆22Updated 6 years ago
Alternatives and similar repositories for term-nh:
Users that are interested in term-nh are comparing it to the libraries listed below
- Various Wireless Driver patches☆32Updated 6 years ago
- EM4x RFID Harvester using a Robotics Connection reader☆14Updated 12 years ago
- Kali Linux u-boot images☆26Updated 6 years ago
- Kali Linux Windows App chroot builder script☆45Updated 6 years ago
- Various Kali Scripts☆55Updated 8 years ago
- kali-sly-pi☆33Updated 6 years ago
- ☆46Updated 6 years ago
- Various Proxmark3 Mods☆56Updated 12 years ago
- ☆36Updated 6 years ago
- CDPSnarf is a network sniffer exclusively written to extract information from CDP (Cisco Discovery Protocol) packets.☆41Updated 14 years ago
- Kali Linux NetHunter utils package☆106Updated 6 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Trying to be the best tool to search for exploits in the terminal.☆20Updated 2 years ago
- Metakitty, The Metasploit Resource Portal☆17Updated 2 months ago
- Interface for the Shodan Computer Search Engine API☆24Updated 4 years ago
- Dependencies for Veil 3☆18Updated 8 years ago
- Remote Administration Tool for Windows☆17Updated 9 years ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆91Updated 6 years ago
- Pentesting Hacking Tools, Scripts, Windows, Linux,☆28Updated 9 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Hash Generator & Cracker☆38Updated 5 years ago
- Vault 7: CIA Hacking Tools Revealed☆16Updated 8 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆39Updated 4 years ago
- gcc-arm-linux-gnueabihf-4.7/☆31Updated 6 years ago
- BlackArch Linux Keyring☆21Updated 6 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- Metasploit Framework☆28Updated 11 years ago
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Updated 9 years ago