screetsec / super-dracos
#Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools including information gathering, forensics, malware analysis, mantaining access, and reverse engineering.
☆32Updated 8 years ago
Alternatives and similar repositories for super-dracos:
Users that are interested in super-dracos are comparing it to the libraries listed below
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆29Updated 11 years ago
- Quick script to set up VPN server and reverse VPN for Nethunter☆35Updated 8 years ago
- hackpack to go with lazykali on menu application Kali Linux☆29Updated 10 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Updated 8 years ago
- Trying to be the best tool to search for exploits in the terminal.☆19Updated 2 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- Gathering Email Information Tool☆37Updated 8 years ago
- POC for injecting Metasploit payloads on arbitrary APKs☆65Updated 8 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 6 years ago
- While documenting some MitM attacks I was looking into setting up a fake AP with BT5 and my good old loved ALFA . There's a whole bunch o…☆17Updated 10 years ago
- Massive arsenal of hacker tools...☆77Updated 7 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- Basic python script for detect airdroid users in lan☆48Updated 4 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆77Updated 5 years ago
- Guard Cats - scripts to automate certain "hack" tasks on NetHunter☆17Updated 6 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago
- Post-Exploitation Framework☆75Updated 8 years ago
- Password cracking utility☆53Updated 3 years ago
- Remote Administration Tool for Windows☆17Updated 9 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Updated 8 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆55Updated 6 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 7 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Simple security surveillance script for linux distributions.☆58Updated 8 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆18Updated 8 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆30Updated 7 years ago
- Information gathering tool - OSINT☆33Updated 6 years ago
- Automatically Scans For Default Networks & Guess The Password☆14Updated 8 years ago