AutoKali automatically installs useful programs and scripts for recon, enumeration and exploitation for Kali Linux that aren't included by default, as well as essential programs for any Kali user.
☆19Jul 20, 2023Updated 2 years ago
Alternatives and similar repositories for AutoKali
Users that are interested in AutoKali are comparing it to the libraries listed below
Sorting:
- Herramienta para realizar fuerza bruta a diferentes servicios.☆10Sep 13, 2021Updated 4 years ago
- Advanced deauthentication script.☆22Dec 17, 2019Updated 6 years ago
- A collection of scripts to run on a fresh install of kali linux☆36Feb 17, 2018Updated 8 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Snowy window wallpaper☆16Apr 8, 2023Updated 2 years ago
- HnuSec 海南大学网安实验室☆13Jan 30, 2024Updated 2 years ago
- This project is simply for the purpose of education. The primary objective of this project is to build a deep-learning model to identify …☆10Apr 1, 2021Updated 4 years ago
- Metasploit Framework☆10Apr 3, 2017Updated 8 years ago
- ☆11Apr 25, 2021Updated 4 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- Python Shellcode 免杀加载器 支持图形化定制开发✌☆10Oct 23, 2022Updated 3 years ago
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆40Dec 3, 2019Updated 6 years ago
- Simple script to bulk check if IPs match networks☆11Jan 11, 2022Updated 4 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- Just simple PoC for the Atlassian Jira exploit. Provides code execution for unauthorised user on a server.☆11Jul 21, 2022Updated 3 years ago
- An online video editor created with ability to animate and export videos on the web!☆12Mar 6, 2023Updated 3 years ago
- EwoMail是基于Linux的企业邮箱服务器,集成了众多优秀稳定的组件,是一个快速部署、简单高效、多语言、安全稳定的邮件解决方案☆13Nov 25, 2022Updated 3 years ago
- A terminal based csv editor which is designed to be not a ram hog like standard csv editors, but more useful than other text editors☆16Sep 28, 2024Updated last year
- ☆11Dec 30, 2025Updated 2 months ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year
- Public Exploits☆10Apr 6, 2021Updated 4 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- AIS3 2020 pre-exam writeup☆10Jun 30, 2020Updated 5 years ago
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Nov 21, 2025Updated 3 months ago
- 域信息收集工具☆11Jun 5, 2023Updated 2 years ago
- A python RCE exploit on QNAP-QTS☆15Sep 15, 2020Updated 5 years ago
- 基于Java的一个功能完善颜值优雅且支持缓存的个人博客,整个博客的开发过程已录制成教程在https://www.bilibili.com/medialist/play/372653463?from=space&business=space&sort_field=pubtim…☆10Oct 17, 2022Updated 3 years ago
- Sophos Central PowerShell module☆11Jul 11, 2023Updated 2 years ago
- A serverless invite-only AI-powered chat bot on Telegram.☆10Mar 7, 2026Updated last week
- A simple script to move mouse between monitors☆13Aug 29, 2021Updated 4 years ago
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- 个人渗透测试常用加解密算法实现。☆12May 18, 2023Updated 2 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- You can use this tool to export your Telegram user, group, or chat history in JSON format, extract text messages, and it can help you ext…☆12May 22, 2025Updated 9 months ago
- Exchange proxylogon 批量漏洞版本扫描工具☆13Mar 7, 2024Updated 2 years ago
- 禅道开源版16.5&16.5beta1,企业版6.5&6.5beta1,旗舰版3.0&3.0beta1的前台SQL注入☆13Jul 28, 2022Updated 3 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆11Nov 6, 2022Updated 3 years ago