ompster / kali2_fixer
Fix Kali 2 Sana issues and post install script for various tools
☆18Updated 9 years ago
Alternatives and similar repositories for kali2_fixer:
Users that are interested in kali2_fixer are comparing it to the libraries listed below
- hackpack to go with lazykali on menu application Kali Linux☆29Updated 10 years ago
- Quick script to set up VPN server and reverse VPN for Nethunter☆35Updated 8 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Updated 11 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆33Updated 8 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- Massive arsenal of hacker tools...☆78Updated 7 years ago
- An automated Python script which installs an extra arsenal of penetration testing tools and utilities into Kali Linux.☆30Updated 7 years ago
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- A collection of scripts to run on a fresh install of kali linux☆34Updated 7 years ago
- A quick, dirty, and effective USB RubberDucky (hak5.com) firmware programming script. Cause typing is hard.☆21Updated 10 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- ARP spoof then session jack within your browser☆29Updated 11 years ago
- Automated man-in-the-middle attack tool.☆50Updated 10 years ago
- Remote Administration Tool for Windows☆17Updated 9 years ago
- This project is aimed to automate hacking by a USB. Currently for Windows, different platforms coming soon☆12Updated 5 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆31Updated 7 years ago
- Guard Cats - scripts to automate certain "hack" tasks on NetHunter☆17Updated 6 years ago
- A Metasploit payload that will connect to the victim and open up a permanent backdoor to their phone.☆51Updated 8 years ago
- Post-Exploitation Framework☆76Updated 8 years ago
- Basic python script for detect airdroid users in lan☆49Updated 4 years ago
- Tools and scripts dedicated to Android application security☆48Updated 4 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Updated 7 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆67Updated 9 years ago
- Vault 7: CIA Hacking Tools Revealed☆15Updated 8 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Updated 8 years ago
- Use hashcat to crack WPA2 PSK (Pre-Shared Key) passwords!☆74Updated 6 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Updated 6 years ago