kalilinuxtools

Poodone – A Comprehensive Toolkit For Cybersecurity Professionals

Meet "Poodone," the ultimate Python script designed for cybersecurity enthusiasts and professionals alike. Packed with a robust array of tools,…

12 months ago

Unbekannt Framework – The Comprehensive Hacking And Pentesting Suite For Windows

The Linux version is no longer supported! The last Linux version is 6.0 that you find inside this repository. The…

12 months ago

Hack The Box Reporting Using SysReptor – Streamline Your Pentesting Documentation

Discover the power of SysReptor, a versatile tool designed to simplify Hack The Box reporting. Whether you prefer cloud-based solutions…

12 months ago

EGO Vulnerability Scanner – Revolutionizing Cybersecurity With Advanced Scanning Capabilities

EGO is a vulnerability scanner developed by chickenpwny at PolitoInc. It was created to provide a platform for hackers to…

12 months ago

OSINTer And Hacking Tools – Advancing Cybersecurity Research And Threat Analysis

In the rapidly evolving landscape of cybersecurity, the "OSINTer & Hacking Tools" program emerges as a cutting-edge toolkit designed for…

12 months ago

Forensic – Detecting Hackers With PCAP Data

This program discusses the development of a machine learning (ML) program designed to identify specific hacking activities using forensic evidence…

12 months ago

Cyber Detective’s OSINT Tools Collection – A Comprehensive Guide For Digital Investigation

Hello! On my Twitter account @cyb_detective I post different services, techniques, tricks and notes about OSINT and more. I collect all the…

1 year ago

WormGPT – A Comprehensive Guide To Setting Up On Various Platforms

WormGPT is a versatile tool designed for creating and managing various types of software across multiple operating systems. This guide…

1 year ago

Ediop3Sploit – Comprehensive Installation And Usage Guide

Ediop3Sploit is a controversial tool often associated with black-hat hacking and illicit cyber activities. This guide provides a step-by-step walkthrough…

1 year ago

T1036.005 – Masquerading : Match Legitimate Name Or Location

In the cybersecurity landscape, attackers constantly devise methods to bypass security measures. One sophisticated technique is T1036.005, or Masquerading: Match…

1 year ago