#Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools including information gathering, forensics, malware analysis, mantaining access, and reverse engineering.
☆36Dec 18, 2016Updated 9 years ago
Alternatives and similar repositories for super-dracos
Users that are interested in super-dracos are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dracos Linux ( www.dracos-linux.org ) is the Linux operating system from Indonesian☆57Dec 13, 2021Updated 4 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆77Apr 26, 2019Updated 6 years ago
- Collection My Wordlist☆122Feb 4, 2017Updated 9 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Jan 26, 2017Updated 9 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Configuration files of my old Arch Linux+Xmonad based setup☆16Apr 7, 2017Updated 8 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆380Apr 13, 2017Updated 8 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆770Apr 5, 2020Updated 5 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,323Jan 23, 2018Updated 8 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆751Sep 1, 2022Updated 3 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- Scripts and other goodies from the pwnieexpress project ported☆10Mar 16, 2014Updated 12 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,252Mar 9, 2020Updated 6 years ago
- Instant messenger honeypot☆16Mar 22, 2016Updated 10 years ago
- A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public☆63Oct 7, 2021Updated 4 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Apr 10, 2022Updated 3 years ago
- Simple and strong password generator that your mother loves it and it works well for her.☆23Jan 26, 2013Updated 13 years ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- Narwhal is a keyword and KEY NARRATIVE manager that creates language-aware classes. Because Narhwal does not use NLP it avoids complexity…☆12Oct 16, 2018Updated 7 years ago
- Linux Kernel Exploit, a PoC ( Proof of Concept )☆20Mar 5, 2018Updated 8 years ago
- ☆13Mar 20, 2021Updated 5 years ago
- Default vectors for melting (all platforms)☆21Jul 6, 2015Updated 10 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Jun 16, 2022Updated 3 years ago
- Install your remote server for the Lamassu Cryptomat☆18Feb 16, 2026Updated last month
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- DEPRECATED, A reboot of my old HAL10K traderbot that was deprecated on MTGox crash. (new algos, new approach)☆13Nov 13, 2016Updated 9 years ago
- Fake AccessPoint Attack☆31Jul 27, 2018Updated 7 years ago
- Check Diffie Hellman group prime parameter☆11Jan 29, 2016Updated 10 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Android FakeID Exploit☆21Aug 7, 2014Updated 11 years ago
- Port Knocking Sequence Discovery Scanner☆17Oct 19, 2016Updated 9 years ago
- Script to scan OpenSSH host key and known_hosts files for shared keys from server hoster Hetzner☆19Jan 1, 2016Updated 10 years ago
- Export your readability links to pocket☆20Sep 6, 2016Updated 9 years ago
- This Repo contains of Duckhunter Hid scripts used in kali Nethunter.☆30Jul 14, 2022Updated 3 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago