Arch Linux Metasploit Framework Installation Script
☆13Nov 28, 2019Updated 6 years ago
Alternatives and similar repositories for MSF-ArchInstaller
Users that are interested in MSF-ArchInstaller are comparing it to the libraries listed below
Sorting:
- Ruby Regular Expression Helper Gem☆17Oct 30, 2016Updated 9 years ago
- Ubuntu Ultimate Install☆13Dec 31, 2012Updated 13 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Detecting malicious WiFi with mining cryptocurrency.☆50Mar 16, 2018Updated 7 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- ☆10Dec 3, 2021Updated 4 years ago
- BlackArch configuration for the bash shell.☆13Jan 11, 2021Updated 5 years ago
- rv6 is a kernel & operating system written entirely in rust.☆11Nov 7, 2019Updated 6 years ago
- WPSPIN.sh for KaliLinux 2☆12Feb 5, 2021Updated 5 years ago
- Multi-threaded port scanner written in C++☆13Dec 17, 2019Updated 6 years ago
- Redefining Web Operating Systems☆18Sep 22, 2025Updated 5 months ago
- USB rubber ducky reverse shell with disabling windows defender☆12Apr 17, 2021Updated 4 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- Simple Admin Finder☆11Apr 25, 2023Updated 2 years ago
- Protect your sensitive HTML content with this AES encryption HTML loader. User will need to key in password in order to view the HTML con…☆11May 5, 2015Updated 10 years ago
- Here are some of ethical hacking tools and scripts in python.☆11Dec 11, 2021Updated 4 years ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago
- 🐦 spideog - Command line utility for Kraken2 reports.☆11Nov 30, 2020Updated 5 years ago
- Introduction to Internet of Things Platforms☆12Sep 1, 2021Updated 4 years ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago
- Remake DarkColony (1997) on OpenRA platform☆13Mar 23, 2022Updated 3 years ago
- Mirror of svn://svn.sv.gnu.org/sysvinit/sysvinit/trunk☆14Dec 30, 2015Updated 10 years ago
- WiFi Pineapple Community Packages☆12Nov 6, 2022Updated 3 years ago
- Higher-order Masking of AES-128 based on the Rivain and Prouff method, CPRR method and Common Shares with Random Reduction method.☆14May 13, 2017Updated 8 years ago
- negamax AI algorithm for turn-based games☆13Oct 6, 2019Updated 6 years ago
- Packet Sniffer for TI CC2531 and TI CC2540 dongles (C++)☆12May 3, 2022Updated 3 years ago
- $HOME — neovim, literate vanilla emacs and doom emacs, fish, tmux, and others☆18Sep 19, 2025Updated 5 months ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- ☆15Apr 20, 2023Updated 2 years ago
- Answers to questions you've already asked☆12Jan 27, 2021Updated 5 years ago
- ☆11Feb 3, 2026Updated 3 weeks ago
- bootableusb - Ön yüklemeli USB sürücü oluştur☆10Sep 14, 2017Updated 8 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- A programming language focused on concurrency and low memory usage☆12Apr 29, 2019Updated 6 years ago
- A little python script to uncovering hidden SSIDs.☆11Oct 29, 2017Updated 8 years ago
- Scripts and Tips for Kali Linux Pi-Tail Edition☆11Dec 8, 2023Updated 2 years ago
- ☆11Jan 2, 2022Updated 4 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago