bash script to help you , doing many penetration testing based on kali linux , help pentester and hackers to deal with kali linux in easy way , depends on high level techniques
☆18Apr 12, 2015Updated 10 years ago
Alternatives and similar repositories for zero-attacker
Users that are interested in zero-attacker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts for Kali Linux☆17May 25, 2017Updated 8 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- a script for Kali Linux☆10Jun 28, 2013Updated 12 years ago
- Cheat sheets for using Kali Linux☆15Feb 17, 2022Updated 4 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Jul 21, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- python script allow red teaming , hackthebox Pwners , OSCP lovers to shorten their time by these useful shells☆33Mar 4, 2021Updated 5 years ago
- ☆17Jul 8, 2021Updated 4 years ago
- Brute Force attack with Python in Kali Linux☆14Mar 6, 2022Updated 4 years ago
- Ansible Provisioned Security Testing Platform☆17Oct 19, 2016Updated 9 years ago
- nmapcli is a tool written in Python with pre-defined scan templates to automate Nmap scans☆11Sep 10, 2017Updated 8 years ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- AutoBrowser Screenshot☆49Oct 27, 2016Updated 9 years ago
- Pentest dropbox setup scripts for Kali Linux☆90Feb 15, 2016Updated 10 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆18Mar 30, 2021Updated 4 years ago
- ☆11Aug 11, 2014Updated 11 years ago
- SlyPI☆20Jun 13, 2013Updated 12 years ago
- Bash script to download all lecture videos & notes for a particular course on Coursera.org.☆13Dec 25, 2015Updated 10 years ago
- Go implementation of Bluez DBus api interfaces needed for P4wnP1☆12Dec 12, 2018Updated 7 years ago
- Shopping Cart is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Can be…☆25Oct 19, 2013Updated 12 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆16Dec 17, 2022Updated 3 years ago
- A collection of my public security advisories.☆28Nov 10, 2025Updated 4 months ago
- A better DNS Cache Snooping tool☆19Mar 8, 2025Updated last year
- The ARP Scanner☆11Apr 19, 2014Updated 11 years ago
- PwnPI, skip all the errors while installing PwnPI on your RPI3, just follow the README.☆13May 19, 2017Updated 8 years ago
- Hacker News on the Terminal☆158Jul 30, 2016Updated 9 years ago
- The MailChimp WordPress plugin allows you to quickly and easily add a signup form for your MailChimp list.☆32Apr 17, 2024Updated last year
- minimal task management for hackers☆31Dec 1, 2015Updated 10 years ago
- A mycroft skill wrapper around a subset of aircrack-ng☆17Jun 1, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A set of bash scripts for offensive security pentesting. (Machine with Kali reccomended)☆13Sep 30, 2016Updated 9 years ago
- ☆20Jun 25, 2015Updated 10 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Decrypt AES256GCM-encrypted data in Apple Pay Payment Tokens.☆10Nov 30, 2018Updated 7 years ago
- Writeup for HackerOne H1-415 2020 CTF☆32Feb 3, 2020Updated 6 years ago
- Firmware and research tools for Nordic Semiconductor nRF24LU1+ based USB dongles and breakout boards.☆23Jan 15, 2019Updated 7 years ago
- Advanced Android and System Hacking Tool . This tool used for some Cyber Attacks in System This Tool used for educational purpose and Thi…☆34Apr 14, 2025Updated 11 months ago