Kali Linux

Sashay all in one Automatic Installer

Introduction

In this article, we will see Sashay Installation. Sashay is an integrated automatic installer for practical Linux-based tools. More than 340 tools are offered.

Installation

pip install -U sashay

Tool Categories

  • Information Gathering
  • Vulnerability Scanner
  • Exploitation Tools
  • Wireless Testing
  • Forensics Tools
  • Web Hacking
  • Stress Testing
  • Sniffing & Spoofing
  • Password Attacks
  • Maintaining Access
  • IP-tracking Tools
  • programming Languages
  • DDOS Attacks
  • Web Servers
  • Distros

How to use

Type sashay or sshy from anywhere in your terminal

Press [TAB] to show completion, each number represents a specific output:

  • to show all available tools. Type the corresponding number of the tool you want to install.
  • to show tool categories
  • to update sashay
  • to know more about sashay
  • x to exit Sashay

You can also type the numbers manually instead of pressing [TAB]

Requirements

Python 3.8+

License

Sashay Installation is released under MIT License

Please consider following and supporting us to stay updated with the latest info

Aman Mishra

Aman Mishra is a eJPT certified and always keen to learn new concepts and methodologies regarding cybersecurity.he is also a cyber security content writer and have passion for sharing my knowledge about the latest threads and trends in the industry.

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

23 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

23 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

3 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

4 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago