#Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools including information gathering, forensics, malware analysis, mantaining access, and reverse engineering.
☆38Dec 18, 2016Updated 9 years ago
Alternatives and similar repositories for super-dracos
Users that are interested in super-dracos are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dracos Linux ( www.dracos-linux.org ) is the Linux operating system from Indonesian☆57Dec 13, 2021Updated 4 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆77Apr 26, 2019Updated 7 years ago
- Collection My Wordlist☆122Feb 4, 2017Updated 9 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆13Jan 24, 2021Updated 5 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆146Jan 26, 2017Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Configuration files of my old Arch Linux+Xmonad based setup☆16Apr 7, 2017Updated 9 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆770Apr 5, 2020Updated 6 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,334Jan 23, 2018Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆752Sep 1, 2022Updated 3 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- A quick and dirty utility to capture and store WiFi probes.☆18Dec 14, 2013Updated 12 years ago
- Scripts and other goodies from the pwnieexpress project ported☆10Mar 16, 2014Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,257Mar 9, 2020Updated 6 years ago
- Instant messenger honeypot☆16Mar 22, 2016Updated 10 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Apr 10, 2022Updated 4 years ago
- Simple and strong password generator that your mother loves it and it works well for her.☆23Jan 26, 2013Updated 13 years ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- Termux packages that are only usable by root users.☆26May 9, 2020Updated 5 years ago
- Narwhal is a keyword and KEY NARRATIVE manager that creates language-aware classes. Because Narhwal does not use NLP it avoids complexity…☆12Oct 16, 2018Updated 7 years ago
- Linux Kernel Exploit, a PoC ( Proof of Concept )☆20Mar 5, 2018Updated 8 years ago
- Wi-fi 802.11 Beacon Frame sniffer☆21Mar 30, 2016Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Currency Recognition On Mobile Phones☆13Jun 15, 2024Updated last year
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Carbanak source code leak.☆10Jul 12, 2018Updated 7 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Jun 16, 2022Updated 3 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- Install your remote server for the Lamassu Cryptomat☆19Mar 30, 2026Updated last month
- DEPRECATED, A reboot of my old HAL10K traderbot that was deprecated on MTGox crash. (new algos, new approach)☆13Nov 13, 2016Updated 9 years ago
- Raspberry Pi 2+ MouseJack port for SPI connected NRF24 modules.☆23Sep 27, 2016Updated 9 years ago
- Fake AccessPoint Attack☆31Jul 27, 2018Updated 7 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Just a homemade icon theme for personal usage.☆11Dec 29, 2015Updated 10 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Android FakeID Exploit☆21Aug 7, 2014Updated 11 years ago
- Port Knocking Sequence Discovery Scanner☆17Oct 19, 2016Updated 9 years ago
- ☆28Jan 12, 2024Updated 2 years ago
- Python scripts for parsing the index file and individual cache files from the cache2 folder of Firefox defaulted on in version 32☆27Sep 27, 2018Updated 7 years ago
- Converts a command to a base64 powershell compatible string☆27Jul 31, 2014Updated 11 years ago