rene-d / mini-kaliLinks
Docker image for hacking
☆21Updated 3 months ago
Alternatives and similar repositories for mini-kali
Users that are interested in mini-kali are comparing it to the libraries listed below
Sorting:
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- WebHook for Red Team☆26Updated 4 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Updated 11 months ago
- Python script that automate the process of generating various reverse shells.☆15Updated 4 years ago
- Python tool for vulnerability assessment and persistence.☆9Updated 4 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆16Updated 4 years ago
- pen testing scripts☆12Updated 4 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆27Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- ☆19Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Web crawler and downloader based on GNU Wget.☆12Updated 2 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Ruby ARP Toolkit☆14Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Repository of tools used in my blog☆51Updated last year
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆12Updated 8 years ago
- Automated Mass Exploiter☆12Updated 6 years ago
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆16Updated 4 years ago
- Modern Javascript keylogger with web panel☆22Updated 5 years ago
- Development☆11Updated 4 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago