Dracos Linux ( www.dracos-linux.org ) is the Linux operating system from Indonesian
☆57Dec 13, 2021Updated 4 years ago
Alternatives and similar repositories for DracOS
Users that are interested in DracOS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆37Dec 18, 2016Updated 9 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Linux Kernel Exploit, a PoC ( Proof of Concept )☆20Mar 5, 2018Updated 8 years ago
- Collection My Wordlist☆123Feb 4, 2017Updated 9 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Jan 26, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Remote Administration Tool for Windows☆19Sep 5, 2015Updated 10 years ago
- Configuration files of my old Arch Linux+Xmonad based setup☆16Apr 7, 2017Updated 9 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆770Apr 5, 2020Updated 6 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆14Jan 24, 2021Updated 5 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆381Apr 13, 2017Updated 8 years ago
- Use setupTermuxArch.sh 📲 to install Arch Linux in Termux on Android, Chromebook and Fire OS. This setup script will attempt to set Arch …☆20Jan 29, 2018Updated 8 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,324Jan 23, 2018Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated 3 months ago
- Instant messenger honeypot☆16Mar 22, 2016Updated 10 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆38Apr 15, 2017Updated 8 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Exploit XXE Out-Of-Band Vulnerability Easily☆16Jul 28, 2016Updated 9 years ago
- Simple and strong password generator that your mother loves it and it works well for her.☆23Jan 26, 2013Updated 13 years ago
- A build system and primary set of packages for Termux.☆15Jan 16, 2022Updated 4 years ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- Automatically exported from code.google.com/p/pweb-suite☆14Jun 8, 2016Updated 9 years ago
- Termux packages that are only usable by root users.☆26May 9, 2020Updated 5 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Jul 10, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- ☆13Apr 19, 2019Updated 6 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆18May 2, 2024Updated last year
- 🐊 A small Password Attack☆15Apr 1, 2024Updated 2 years ago
- Install your remote server for the Lamassu Cryptomat☆18Mar 30, 2026Updated last week
- Windows/Linux - ReverseShellBackdoor Framework☆51Jun 8, 2019Updated 6 years ago
- Chromium- and Firefox-compatible extension to add downloads to ocDownloader directly form your browser☆14May 17, 2019Updated 6 years ago