#Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools including information gathering, forensics, malware analysis, mantaining access, and reverse engineering.
☆36Dec 18, 2016Updated 9 years ago
Alternatives and similar repositories for super-dracos
Users that are interested in super-dracos are comparing it to the libraries listed below
Sorting:
- Dracos Linux ( www.dracos-linux.org ) is the Linux operating system from Indonesian☆57Dec 13, 2021Updated 4 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆77Apr 26, 2019Updated 6 years ago
- Collection My Wordlist☆122Feb 4, 2017Updated 9 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Jan 26, 2017Updated 9 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆379Apr 13, 2017Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆770Apr 5, 2020Updated 5 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,321Jan 23, 2018Updated 8 years ago
- ☆13Mar 20, 2021Updated 4 years ago
- Scripts and other goodies from the pwnieexpress project ported☆10Mar 16, 2014Updated 11 years ago
- Simple and strong password generator that your mother loves it and it works well for her.☆23Jan 26, 2013Updated 13 years ago
- Unnamed repository; edit this file 'description' to name the repository.☆15Jul 6, 2015Updated 10 years ago
- Packet sniffer using scapy☆25Mar 21, 2020Updated 5 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,249Mar 9, 2020Updated 5 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆750Sep 1, 2022Updated 3 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- This project is about using the BLE module of an M5Stack running MicroPython☆22Dec 2, 2020Updated 5 years ago
- Termux packages that are only usable by root users.☆26May 9, 2020Updated 5 years ago
- ☆55Jul 20, 2017Updated 8 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Jul 10, 2018Updated 7 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Converts a command to a base64 powershell compatible string☆27Jul 31, 2014Updated 11 years ago
- The ModSecurity Pcap Connector☆27Jan 13, 2016Updated 10 years ago
- Duitku Payment gateway for PHPNuxBill☆12Aug 23, 2025Updated 6 months ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Jan 25, 2017Updated 9 years ago
- just code snippets☆19Oct 16, 2016Updated 9 years ago
- ☆12Sep 8, 2022Updated 3 years ago
- WiFi Attacking Application With User Interface☆11Dec 11, 2022Updated 3 years ago
- 👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡☆30Jul 23, 2018Updated 7 years ago
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- Smart pentesting toolkit for modern WPA/WPA2 networks ⚔️📡☆27Jun 19, 2020Updated 5 years ago
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆88Jun 11, 2018Updated 7 years ago