pinpox / kali-i3Links
Create Kali Linux VM with i3 using Vagrant and Ansible
☆15Updated 5 years ago
Alternatives and similar repositories for kali-i3
Users that are interested in kali-i3 are comparing it to the libraries listed below
Sorting:
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- ☆20Updated last year
- 🌍 🕵️ Arch-Osint Linux OS VM based on Blackarch.☆25Updated 2 years ago
- Play Hack The Box directly on your system.☆51Updated 2 months ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆19Updated 3 years ago
- Scrape files for sensitive information, and generate an interactive HTML report. Based on Rabin2.☆16Updated last month
- Visualize BBOT scans in realtime with VivaGraphJS☆57Updated last year
- Rubber Ducky powered by NeoKey☆27Updated last year
- Gadget IoC removal from HAK5's BashBunny☆20Updated 2 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆44Updated 2 years ago
- An Effiecent Tool To Change Tor IP's in Seconds,change mac address and clean all logs☆38Updated 4 years ago
- Legba recipes.☆51Updated last year
- i3 for kali-linux 1 shot setup configs included☆12Updated 2 years ago
- This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc.☆11Updated last year
- 🌟 Beautiful, high-performance Athena OS documentation☆22Updated this week
- Aliases and functions for the lazy penetration tester☆69Updated last year
- Hackthebox tools☆12Updated 6 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆32Updated 8 months ago
- Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.☆16Updated last year
- Collection of extra pentest tools for Kali Linux☆109Updated last month
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Updated 3 years ago
- Simple script to download some missing tools in Kali☆33Updated 4 years ago
- CATANA - CUT your Wordlist!☆14Updated 3 years ago
- Internal Network Penetration Test Playbook☆20Updated 4 years ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆45Updated 2 years ago
- Various scripts & tools☆12Updated last year
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆106Updated 2 years ago
- Our fork of Iceman's fork for Proxmark III☆17Updated 10 months ago
- Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells…☆20Updated 2 years ago
- A template-based tool for quickly constructing and running advanced Boolean searches on Google and Twitter/X for person-based OSINT inves…☆17Updated 11 months ago