tanc7 / GladiatorCLILinks
Command Line Interface/Framework for Black Hat CTF Competitors
☆10Updated 2 years ago
Alternatives and similar repositories for GladiatorCLI
Users that are interested in GladiatorCLI are comparing it to the libraries listed below
Sorting:
- New and improved Man-In-The-Middle Framework fixes for Nethunter Phones and Tablets☆31Updated 6 years ago
- Portable Hacking Machine with Raspberry Pi☆88Updated 6 years ago
- A collection of scripts to run on a fresh install of kali linux☆37Updated 7 years ago
- Get your USB Rubber Ducky up and running faster☆43Updated 7 years ago
- Python Security/Hacking Kit☆45Updated 5 years ago
- A curated list of awesome warez and piracy links☆28Updated 4 years ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆24Updated 4 years ago
- Smart pentesting toolkit for modern WPA/WPA2 networks ⚔️📡☆28Updated 5 years ago
- This project is aimed to automate hacking by a USB. Currently for Windows, different platforms coming soon☆12Updated 5 years ago
- A collection of spywares for education scopes☆39Updated 8 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆47Updated 2 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆30Updated 7 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆26Updated 8 years ago
- Hacking Tools☆47Updated 6 years ago
- Pentesting Suite Deployer for Raspbian Stretch☆21Updated 7 years ago
- Its like airgeddon but better!☆58Updated 11 months ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11Updated 2 years ago
- Bash script using hcxdumptool, hcxtools and hashcat to collect WPA2 handshakes and/or PMKIDs, convert them to hashcat format and perform …☆16Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆55Updated 7 years ago
- Based on reading from The Hackers Playbook 3☆29Updated 5 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- Some scripts and stuff for wardriving and wifi hacks .... works great on kali and ubuntu 32 bit ...Reaver likes 32 bit binaries.☆26Updated 4 years ago
- WIP - Chromium plugin for PhoneInfoga's Google Search scanner☆80Updated 4 years ago
- Hacking Tools For All Debian-based OS☆51Updated 7 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆12Updated 4 years ago
- Get files from Android directories☆11Updated 6 years ago
- SMS Spoofer for Social Engineering/Pentest Engagements☆44Updated 7 years ago
- Ducky Script for Arduino Leonardo Mini & Arduino Uno + Payload to Arduino Converter☆34Updated 7 years ago
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆42Updated 5 years ago