this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , install another and update to new #actually for lazy people hahaha #and Lalin is remake the lazykali with fixed bugs , added new features and uptodate tools . It's compatible with the latest release of Kali (Rolling)
☆379Apr 13, 2017Updated 8 years ago
Alternatives and similar repositories for LALIN
Users that are interested in LALIN are comparing it to the libraries listed below
Sorting:
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,321Jan 23, 2018Updated 8 years ago
- Collection My Wordlist☆122Feb 4, 2017Updated 9 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆770Apr 5, 2020Updated 5 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Jan 26, 2017Updated 9 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,437Nov 3, 2018Updated 7 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,248Mar 9, 2020Updated 5 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆36Dec 18, 2016Updated 9 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆513Jan 8, 2017Updated 9 years ago
- [unmaintained] Post-exploitation tool☆181Jan 28, 2016Updated 10 years ago
- PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo☆533Nov 4, 2016Updated 9 years ago
- Undetectable Windows Payload Generation☆1,607Nov 8, 2022Updated 3 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Jul 24, 2019Updated 6 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225May 8, 2021Updated 4 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆601Jul 18, 2021Updated 4 years ago
- transform your payload.exe into one fake word doc (.ppt)☆468Dec 8, 2019Updated 6 years ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆448Jan 31, 2018Updated 8 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- Linux bash script automation for metasploit☆268Jul 11, 2019Updated 6 years ago
- pentest framework☆1,243Feb 21, 2019Updated 7 years ago
- A tool that transforms Firefox browsers into a penetration testing suite☆508May 14, 2025Updated 9 months ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆327Jun 25, 2022Updated 3 years ago
- A Phishing Dropper designed to Pentest.☆276May 15, 2017Updated 8 years ago
- The New Hacking Framework☆705Apr 5, 2021Updated 4 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆874Dec 28, 2018Updated 7 years ago
- Hakku Framework penetration testing☆353Oct 17, 2021Updated 4 years ago
- The Hacker's ToolBox☆191Jun 29, 2017Updated 8 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆339Jul 31, 2024Updated last year
- Efficient and advanced man in the middle framework☆2,174Mar 23, 2023Updated 2 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆77Apr 26, 2019Updated 6 years ago
- Sets Transparent proxy tunnel through Tor, I2P, Privoxy, Polipo and modify DNS; Include Anonymizing Relay Monitor (arm), macchanger and w…☆318Sep 26, 2022Updated 3 years ago
- wide range mass audit toolkit☆1,034Oct 3, 2018Updated 7 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆263Oct 31, 2017Updated 8 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆408Jul 14, 2016Updated 9 years ago
- Some usefull scripts for KaliLinux☆473Aug 26, 2022Updated 3 years ago
- Python script to inject existing Android applications with a Meterpreter payload.☆644Jul 21, 2023Updated 2 years ago
- intercepting kali router☆443Aug 31, 2017Updated 8 years ago