Dracos Linux ( www.dracos-linux.org ) is the Linux operating system from Indonesian
☆57Dec 13, 2021Updated 4 years ago
Alternatives and similar repositories for DracOS
Users that are interested in DracOS are comparing it to the libraries listed below
Sorting:
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆36Dec 18, 2016Updated 9 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆77Apr 26, 2019Updated 6 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Configuration files of my old Arch Linux+Xmonad based setup☆16Apr 7, 2017Updated 8 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Jan 26, 2017Updated 9 years ago
- Collection My Wordlist☆122Feb 4, 2017Updated 9 years ago
- Detail tentang proyek BlankOn XI Uluwatu☆15Jul 6, 2018Updated 7 years ago
- Linux Kernel Exploit, a PoC ( Proof of Concept )☆20Mar 5, 2018Updated 7 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆13Jan 24, 2021Updated 5 years ago
- An all-in-one tool to create and maintain Debian-derived GNU/Linux distribution: from packaging to repository, from ISO build to release …☆25Feb 16, 2026Updated 2 weeks ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆379Apr 13, 2017Updated 8 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆770Apr 5, 2020Updated 5 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated last month
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- Instant messenger honeypot☆16Mar 22, 2016Updated 9 years ago
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆12Nov 17, 2020Updated 5 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆51Jun 8, 2019Updated 6 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,321Jan 23, 2018Updated 8 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- Chromium- and Firefox-compatible extension to add downloads to ocDownloader directly form your browser☆14May 17, 2019Updated 6 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- cve-2018-2894 不同别人的利用方法。☆15Dec 1, 2025Updated 3 months ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Jan 6, 2019Updated 7 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆16Jul 28, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/pweb-suite☆14Jun 8, 2016Updated 9 years ago
- Mirror repository, PRs are not watched, please use Xfce's GitLab☆11Dec 22, 2025Updated 2 months ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆39Apr 15, 2017Updated 8 years ago
- An open source deobfuscator for 'Obfuscar'☆29May 10, 2016Updated 9 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- C# Implementation of Get-VaultCredential☆14Jul 31, 2018Updated 7 years ago
- Deobfuscate Babel 8.5's VM☆12Aug 11, 2016Updated 9 years ago
- Automated version of CVE-2018-14847 (MikroTik Exploit)☆15Jun 12, 2025Updated 8 months ago