pinpox / kali-i3Links
Create Kali Linux VM with i3 using Vagrant and Ansible
☆15Updated 5 years ago
Alternatives and similar repositories for kali-i3
Users that are interested in kali-i3 are comparing it to the libraries listed below
Sorting:
- Play Hack The Box directly on your system.☆50Updated last month
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆19Updated 3 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10Updated 4 years ago
- Aliases and functions for the lazy penetration tester☆69Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆13Updated 2 months ago
- Kali Packerge Manager☆65Updated last year
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆13Updated 11 months ago
- Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.☆16Updated last year
- Various scripts & tools☆12Updated last year
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 2 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- ☆10Updated 3 years ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆18Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆50Updated last year
- A new and improved DeadTrap with more efficient time span for scanning a number☆30Updated 5 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆53Updated 7 months ago
- web application pentesting tools for docker☆18Updated 3 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated 2 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Automatic reverse/bind shell generator cheat sheet.☆34Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆109Updated last week
- Ded Security Framework is a tool aimed at security professionals☆36Updated last year
- Simple script to download some missing tools in Kali☆33Updated 4 years ago
- Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells…☆19Updated 2 years ago
- Repository of useful payloads and tips for pentesting/bug bounty.☆27Updated 10 months ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Updated 4 years ago
- Github profile☆16Updated 4 months ago