#Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools including information gathering, forensics, malware analysis, mantaining access, and reverse engineering.
☆37Dec 18, 2016Updated 9 years ago
Alternatives and similar repositories for super-dracos
Users that are interested in super-dracos are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆77Apr 26, 2019Updated 6 years ago
- Collection My Wordlist☆123Feb 4, 2017Updated 9 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆14Jan 24, 2021Updated 5 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Jan 26, 2017Updated 9 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Configuration files of my old Arch Linux+Xmonad based setup☆16Apr 7, 2017Updated 9 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,326Jan 23, 2018Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- just code snippets☆18Oct 16, 2016Updated 9 years ago
- A quick and dirty utility to capture and store WiFi probes.☆18Dec 14, 2013Updated 12 years ago
- Unnamed repository; edit this file 'description' to name the repository.☆16Jul 6, 2015Updated 10 years ago
- Scripts and other goodies from the pwnieexpress project ported☆10Mar 16, 2014Updated 12 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,254Mar 9, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Instant messenger honeypot☆16Mar 22, 2016Updated 10 years ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- Termux packages that are only usable by root users.☆26May 9, 2020Updated 5 years ago
- Wi-fi 802.11 Beacon Frame sniffer☆21Mar 30, 2016Updated 10 years ago
- Currency Recognition On Mobile Phones☆13Jun 15, 2024Updated last year
- ☆13Apr 19, 2019Updated 6 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Jun 16, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- Install your remote server for the Lamassu Cryptomat☆18Mar 30, 2026Updated 2 weeks ago
- Fake AccessPoint Attack☆31Jul 27, 2018Updated 7 years ago
- Check Diffie Hellman group prime parameter☆11Jan 29, 2016Updated 10 years ago
- Android FakeID Exploit☆21Aug 7, 2014Updated 11 years ago
- Converts a command to a base64 powershell compatible string☆27Jul 31, 2014Updated 11 years ago
- Script to scan OpenSSH host key and known_hosts files for shared keys from server hoster Hetzner☆19Jan 1, 2016Updated 10 years ago
- Export your readability links to pocket☆20Sep 6, 2016Updated 9 years ago
- 3D modelling and printing Android app! It allows the user to draw a shape on the device and have it printed out on a 3D printer☆23Jan 30, 2013Updated 13 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- A checkout form using the Polymer gold elements☆10Aug 12, 2016Updated 9 years ago
- Collection of tools for privesc on Linux☆34Aug 28, 2013Updated 12 years ago
- ☆14Dec 19, 2017Updated 8 years ago
- Python based script for Information Gathering.☆105Jan 13, 2026Updated 3 months ago