s-h-3-l-l / katoolin3
Get your favourite Kali Linux tools on Debian/Ubuntu/Linux Mint
☆366Updated 4 years ago
Alternatives and similar repositories for katoolin3:
Users that are interested in katoolin3 are comparing it to the libraries listed below
- parrot anonymous mode☆378Updated last year
- Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3…☆301Updated 2 years ago
- DREAM DEVICE FOR HACKERS☆229Updated 4 years ago
- TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected v…☆884Updated 4 years ago
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆892Updated last year
- PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.☆120Updated last year
- Fetch, install and search wordlist archives from websites and torrent peers.☆508Updated 10 months ago
- MSFvenom Payload Creator (MSFPC)☆1,249Updated 3 years ago
- 🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN …☆537Updated 5 years ago
- A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.☆1,118Updated last year
- Adds ability to successfully login into websites that have a delay after login and adds directory of chromedriver, this fork was used in …☆152Updated 2 years ago
- Transparent proxy through Tor for Kali Linux OS☆1,082Updated 10 months ago
- ☆103Updated 3 years ago
- Official module repository for the Recon-ng Framework.☆231Updated 7 months ago
- Hydra Password Cracking Cheetsheet☆395Updated 4 years ago
- coWPAtty: WPA2-PSK Cracking☆196Updated 6 years ago
- A Wireless (WPA/WPA2) Pentest/Cracking tool. Captures & Crack 4-way handshake and PMKID key. Also, supports a deauthentication/jammer mod…☆992Updated 4 years ago
- Community-built scenarios for Wifiphisher☆349Updated 3 years ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆584Updated 10 months ago
- The New Hacking Framework☆695Updated 3 years ago
- Sets Transparent proxy tunnel through Tor, I2P, Privoxy, Polipo and modify DNS; Include Anonymizing Relay Monitor (arm), macchanger and w…☆313Updated 2 years ago
- ☆282Updated 3 years ago
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities☆299Updated 7 months ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,843Updated last year
- PowerFull Administration Tool For Linux☆140Updated 7 years ago
- uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or direc…☆818Updated 2 years ago
- Capture handshakes of nearby WiFi networks automatically☆746Updated 3 years ago
- A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generati…☆292Updated 2 years ago
- Automated WPA/WPA2 PSK attack tool.☆558Updated 3 years ago
- 🔎 shodansploit > v1.3.0☆533Updated 2 years ago