pwnwiki / kaliwiki
Unofficial Kali Documentation Project
☆160Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for kaliwiki
- Metasploit Usage Wiki☆48Updated 9 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆84Updated 10 years ago
- WPS scan and pwn tool☆66Updated 5 years ago
- Useful pentesting scripts☆83Updated 7 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆55Updated 6 years ago
- Yet another AV evasion tool☆119Updated 2 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆139Updated 9 years ago
- Passive Vulnerability Auditor☆128Updated 8 years ago
- Veil Catapult is no longer supported☆76Updated 8 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Updated 10 years ago
- Shell-style script to search exploit-db.com exploits.☆59Updated 2 months ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆144Updated 8 years ago
- Simple reverse ICMP shell☆40Updated 11 years ago
- ☆44Updated 8 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- ☆52Updated 8 years ago
- Powershell Reverse Rubber Ducky☆55Updated 9 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆241Updated 10 years ago
- Python2 / BASH / VBS- UAC D&E Rubber Ducky☆60Updated 6 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆43Updated 5 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆107Updated 8 years ago
- Your last stop for password list generation needs!☆27Updated 9 years ago
- Search exploits in multiple exploit databases!☆80Updated 4 years ago