Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
-
Updated
Nov 13, 2020
{{ message }}
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
Automated pentest framework for offensive security experts
Free Security and Hacking eBooks
Next generation web scanner
Top 100 Hacking & Security E-Books (Free Download)
The LAZY script will make your life easier, and of course faster.
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install almost 370+ hacking tools in termux app and other linux based distributions.
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.org https://twitter.com/owtfp
A collection of utilities for Windows 10 Linux Subsystems
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
jSQL Injection is a Java application for automatic SQL database injection.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
MSFvenom Payload Creator (MSFPC)
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Pentest environment deployer (kali linux + targets) using vagrant and chef.
Automate Pentest Tool
A collection of wordlists dictionaries for password cracking
Transparent proxy through Tor for Kali Linux OS
Windows Privilege Escalation Techniques and Scripts
Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Add a description, image, and links to the kali-linux topic page so that developers can more easily learn about it.
To associate your repository with the kali-linux topic, visit your repo's landing page and select "manage topics."