Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for shell evil
evil
x
shell
x
27 search results found
Evil.sh
⭐
2,020
🙊 Subtle and not-so-subtle shell tweaks that will slowly drive people insane.
Instahack
⭐
1,250
instahack is a bash & python based script which is officially made to test password strength of Instagram account from termux and kali with bruteforce attack and. it based on tor This tool works on both rooted Android device and Non-rooted Android device. Best Tool For Instagram Bruteforce hacking Tool By Waseem Akram. Made in Bash & python. This is an official repository of instahack
Mf Install
⭐
556
Media Foundation workaround for Wine
Dotfiles
⭐
222
:octocat: Ninrod's sharpened dotfiles for emacs, vim, zsh, tmux. Since '15.
Dotfiles Win
⭐
158
🙈 oh-my-zsh on bash on windows configuration files
Cryptboot
⭐
137
Encrypted boot partition manager with UEFI Secure Boot support
Linsetmv1 2
⭐
85
Linset is a WPA/WPA2 phishing tool (evil twin)
Airgeddon Plugins
⭐
57
Enhanced functions and new features for airgeddon!
Matrix
⭐
47
My Privacy DNS #Matrix lists for blacklisting
Xevilteddy
⭐
37
An evil teddy bear that steals your secrets
The Essentials
⭐
32
A script that I made to get the essentials I use for various reasons on Kali Linux.
Wifimosys
⭐
30
Ataque EVIL TWIN
Xhyvedocker
⭐
29
Evil hack to run boot2docker under xhyve
Config Files
⭐
22
config files in home dir
Void
⭐
16
VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute force and other things... You have many choices. If you want to learn penetration , VOID may be a teacher for you. Because its open source code project. Please look VOID's source code and examine commands! And please dont forget to star project.
Purple
⭐
16
scripts to setup environments for red/blue teams.
Evil Shock
⭐
13
Shock the shell! Exploit many injection method for shellshock
V2ray Apache Ws
⭐
13
A Script for websockets configuration of v2ray and apache. Break the evil GFW
Hand Of Evil
⭐
8
Xcursor theme based on Dungeon Keeper II in-game cursors.
Mkinitcpio Antievilmaid
⭐
8
Anti Evil Maid support for Arch Linux's mkinitcpio
De Luks
⭐
8
Implementation of an evil maid attack against Linux's most popular full-disk encryption tool
Aids
⭐
7
backdoor for Debian/Redhat based Linux systems for CCDC
Evil Twin
⭐
6
Automating a evil twin access point
Splunk Spectre Meltdown Uf Script
⭐
6
A script modified from speed47 to provide KV-pair results into a Splunk UF scripted input
Devil Eye
⭐
6
Devil-Eye is used for adding banner in termux and customize it.
Booty
⭐
5
Minimal forensic/exfiltration/evil-maid/rescue live boot system
Evil Twin Automated
⭐
5
Automated Evil Twin attack. In progress
Related Searches
Shell Docker (20,660)
Shell Script (15,351)
Shell Bash (10,338)
Shell Command Line (6,542)
Shell Dotfiles (5,338)
Shell Git (4,715)
Shell Ansible (4,427)
Shell Server (3,563)
Shell Ssh (3,562)
Shell Docker Image (3,406)
1-27 of 27 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.