simdsoft / sources.listLinks
The ubuntu sources list collection.
☆29Updated 7 months ago
Alternatives and similar repositories for sources.list
Users that are interested in sources.list are comparing it to the libraries listed below
Sorting:
- Short guide on how to connect to Termux SSH from anywhere while using TailScale as connection link.☆12Updated 4 years ago
- ☆106Updated last year
- A script to build either Blackarch, Kali linux or ParrotOS Docker container which has the ability to provide desktop environment access e…☆40Updated 4 years ago
- Official Athena OS docker base images.☆12Updated last month
- w1f1t3kAl1☆46Updated last year
- A Network Automation framework focused on Cyber-Security☆46Updated 2 years ago
- ☆119Updated 4 years ago
- Network sniffing automation with Bettercap as rogue AP or as client in your network☆25Updated 3 years ago
- OpenVPN VPN Gate Client for Linux, connects you to a random Free VPN in a country of your choice by country code.☆48Updated 4 months ago
- SilentSpy Android RAT Tool☆16Updated 2 years ago
- ☆47Updated this week
- The WiFi Penetration Toolkit☆29Updated 4 years ago
- Useful related to airgeddon packages for Debian based Linux distributions☆56Updated last month
- AircrackNG commands guide☆21Updated 7 years ago
- onex is a hacking tool installer and package manager for hackers. Onex is a library of all hacking tools for Turmex and other Linux distr…☆85Updated 6 years ago
- This script will auto setup vncserver in Kali Linux Raspberry Pi 3 and Raspberry Pi Zero W for VNC session☆78Updated 6 years ago
- Kali Linux advanced setup☆137Updated 8 months ago
- GUC - Go UnderCover : Switch appearance from *unix to Windows ( Kali-undercover for all distros )☆37Updated 2 years ago
- Easily Make Raspberry Pi 3 or Raspberry Pi Zero w as a WiFi RouterEasily Make Raspberry Pi 3 or Raspberry Pi Zero w as a WiFi Router☆57Updated 7 years ago
- proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, …☆33Updated 2 years ago
- A bash script to easily run TOR hidden service on termux and most linux distros☆51Updated 2 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆68Updated 2 years ago
- Wordlist creator written in C to generate all possibilities of passwords☆24Updated 7 years ago
- Exodia Wireless Editions src ISO for Wireless Pentesting☆27Updated last month
- This Kali Linux Docker container offers a full desktop experience by using the tightvncserver to provide a VNC connection to the containe…☆85Updated 3 years ago
- Packaging scripts and related configs for distributing Kismet☆47Updated 5 months ago
- Kali Linux for WSL1 or WSL2 and desktop sessions over RDP.☆75Updated last year
- Fast SSH Scan and BruteForcer for most common credentials.☆23Updated 7 years ago
- # Exploit Title: Mikrotik WinBox 6.42 - Credential Disclosure (Metasploit)☆48Updated 5 years ago
- A simple shell module for helping you to write better scripts. With this little module you can use some functions that allow you to showi…☆19Updated 4 years ago