This tool serves to add the kali linux repository to the ubuntu repository instantly. So that ubuntu users can install some of the tools that exist on kali linux.
☆19Apr 16, 2022Updated 4 years ago
Alternatives and similar repositories for ToolsBox
Users that are interested in ToolsBox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Subscan is a simple tool for subdomain scanner, it can scan subdomains fast.☆41Aug 9, 2023Updated 2 years ago
- WEB SQLi Injection DB Dumper DATA Hacking Tool☆13Oct 1, 2019Updated 6 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 3 years ago
- SQL Detector Tool In Go Language☆22Jan 10, 2023Updated 3 years ago
- Linux installer stuffs☆11Aug 7, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Web Vulnerability Scanner.☆13Mar 30, 2022Updated 4 years ago
- Compare the given environment variable value across all the processes☆16Dec 5, 2024Updated last year
- #Just simple program to spoofing device by sending malicious link☆33Mar 1, 2022Updated 4 years ago
- Want .uf2 files for your switch hacking needs? ask and link to the .bin payload you want, and I may get to it in my free time. I understa…☆18Feb 4, 2021Updated 5 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- HackToolKit☆25Nov 22, 2022Updated 3 years ago
- OSINT Google search automation to find emails, names, locations and past breaches information☆20Jul 3, 2023Updated 2 years ago
- Personal blog about cyber security and challenges☆20Mar 25, 2026Updated last month
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A library to modify another program's memory on linux x64.☆16Sep 10, 2025Updated 8 months ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- Aggressive Mass AP Deauth/Jammer (PWN ALL WIFI IN RANGE)☆14May 26, 2023Updated 2 years ago
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 4 years ago
- Get RF frequencies that are above the set threshold by hopping through a list of commonly used frequencies☆10Sep 14, 2023Updated 2 years ago
- Virus Repository☆53Oct 13, 2024Updated last year
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 4 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆18Oct 11, 2019Updated 6 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆21Aug 4, 2020Updated 5 years ago
- Jok3r - Network and Web Pentest Framework☆17Apr 21, 2019Updated 7 years ago
- DEDSEC-VPN is a Linux-based VPN tool that hides your real IP and blocks IPv6 leaks.☆34Feb 21, 2026Updated 2 months ago
- Virus Repository☆30Jan 2, 2022Updated 4 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- ☆19Dec 2, 2023Updated 2 years ago
- Experimentation code for ETSO GMR-1 satellite telephony networks; mirror of https://gitea.osmocom.org/satellite/osmo-gmr☆18Oct 21, 2022Updated 3 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Jul 21, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- HashRipper is a powerful and fast multi-threaded ethical hacking tool written in Python for cracking hashes. It supports over 17+ popular…☆23Apr 12, 2026Updated last month
- Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools☆60Nov 30, 2022Updated 3 years ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆25Aug 13, 2023Updated 2 years ago
- Advanced, Light Weight & Extremely Fast MD5 Cracker/Decoder/Decryptor written in Python 3☆25Jan 10, 2021Updated 5 years ago
- Wifi password cracking tool tested (PLDT-Home Wifi)☆57Jun 30, 2024Updated last year
- It is a user friendly, easy to implement GUI for GSM IMSI catching. Any user from any research background can sniff IMSI's of users whose…☆14Jan 21, 2019Updated 7 years ago
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated 4 months ago