pinpox / kali-i3View external linksLinks
Create Kali Linux VM with i3 using Vagrant and Ansible
☆16Feb 18, 2020Updated 5 years ago
Alternatives and similar repositories for kali-i3
Users that are interested in kali-i3 are comparing it to the libraries listed below
Sorting:
- this script for fix problem vpn on kali linux "Rooling" only :)☆11Feb 17, 2017Updated 8 years ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- Tools By Pro For Termux☆24Jul 17, 2022Updated 3 years ago
- ☆10Feb 19, 2022Updated 3 years ago
- A simple python telegram bot checking if a product is in stock☆10Apr 8, 2023Updated 2 years ago
- ☆15Dec 3, 2020Updated 5 years ago
- A short guid on installing a2dp-bluetooth on raspbian jessy☆10Jan 23, 2017Updated 9 years ago
- super duper web sight☆12Jul 9, 2025Updated 7 months ago
- ☆16Dec 9, 2015Updated 10 years ago
- Various scripts & tools☆12Apr 22, 2024Updated last year
- Airsoft DOMINATION Timer based on Arduino with RFID or button user entry. Timer consist of MCU (Arduino or ATmega chip) and 2 or 4-row di…☆11Updated this week
- a github repo that will be used for teaching bash optimizations in a youtube series☆10Jul 6, 2021Updated 4 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Apr 20, 2023Updated 2 years ago
- Exploit for CVE-2023-38571☆13Sep 27, 2023Updated 2 years ago
- A custom git utility for managing file sizes in your git workflow.☆11Jan 17, 2022Updated 4 years ago
- Generate direct m3u playlist for all the channels subscribed in the Tata Sky portal with Termux☆11Sep 5, 2021Updated 4 years ago
- PKIX certificates management for Erlang☆12Jun 27, 2024Updated last year
- ☆13Feb 9, 2020Updated 6 years ago
- Golang implementation of Conway's Game of Life☆14Aug 8, 2021Updated 4 years ago
- ☆13Feb 1, 2026Updated last week
- Post-quantum Wireguard (Theory)☆12Sep 9, 2020Updated 5 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- Ruby script for cracking ECDSA private key☆10Mar 25, 2017Updated 8 years ago
- Simple gksu replacement using spacefm dialog, zenity or yad☆10Feb 23, 2022Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- ☆16Apr 24, 2024Updated last year
- Use SSH keys from 1Password with age☆14Apr 29, 2025Updated 9 months ago
- Arduino controller 18650 charge and discharge station☆12Jan 3, 2017Updated 9 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- Skeleton project for your own GRUB-based bootkit☆17Jan 11, 2020Updated 6 years ago
- Termux interactive package installer☆12Feb 2, 2026Updated last week
- Python script to create Termux packages easily.☆11Feb 8, 2022Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆14Apr 22, 2020Updated 5 years ago
- All Base libraries decryption tool☆14Jan 2, 2022Updated 4 years ago
- Kali Linux Bugs & Problems Automatic Fix Script☆12Sep 14, 2017Updated 8 years ago
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane☆14Mar 24, 2023Updated 2 years ago
- Decrypts RSDF, CFF and DLC files using a web service☆14Nov 20, 2018Updated 7 years ago
- Populates Gravity Forms dropdowns with country and province/state names☆12Jan 5, 2021Updated 5 years ago
- Explained in few steps what should one do in order to be able to inspect mobile (iOS and Android) app☆12Jul 12, 2017Updated 8 years ago