There are 44 repositories under kalilinux topic.
Kali Linux Cheat Sheet for Penetration Testers
ADB-Toolkit V2 for easy ADB tricks with many perks in all one. ENJOY!
Complete Listing and Usage of Tools used for Ethical Hacking
Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
ALL IN ONE Hacking Tool For Hackers, Penetration Tester and Cybersecurity. New Version Beginner to Advanced Tool. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !
Top 20 Kali Linux Related E-books (Free Download)
Kali and Parrot OS docker images accessible via VNC, RDP and Web
A Automate script for WiFi hacking .
NetHunter Rootless Edition. Maximum flexibility with no commitment. Install Kali NetHunter on any stock, unrooted Android device without voiding the warranty.
Realtek RTL8xxxU
Black-Tool v5.0.0 ⬛
ITWSV- Integrated Tool for Web Security Vulnerability
Hey there, This tool will help you to install Kali-Nethunter in your non-rooted android device with root privileges in CLI or GUI mode. Hope you like this tool <3.
This Guide will help you install Kali Linux in Android, that too with a GUI Desktop Environment within Android. It uses Termux to run Kali Linux in Android with XFCE4 Desktop Environment and a Tight VNC Server, which we connect to using a VNC Viewer app in Android.
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
This is a repository that will be used to help create a process of a new kali vagrant box for hashicorp each week.
This tool will steal the credentails of a person
Kali Linux Theme Installer , Zsh Shell , Pure Look
Collection of Volatility3 symbols, generated against Linux and macOS kernels.
For Education Purpose Only (Self Learning)
HOW TO FIX THE MISSING FIRMWARE OR THE NONFREE FIRMWARE AFTER KALI-LINUX INSTALLATION
Espero que pruebes este mini proyecto... 💭
Collection of Volatility2 profiles, generated against Linux kernels.
Automated Shell Script Install WiFi Driver ( Broadcom ) in Kali Linux 2022 Versions. Originally Made By SSTec Tutorials.