Kali Tutorials Archives - Ibnshehu
Home Kali Tutorials

Kali Tutorials

Kali Linux is one of the best open-source security packages of an ethical hacker, containing a set of tools divided by categories. Kali Linux can be installed in a machine as an Operating System, which is discussed in this tutorial. Installing Kali Linux is a practical option as it provides more options to work and combine the tools. This tutorial gives a complete understanding on Kali Linux and explains how to use it in practice.

iky

iKy – Tool that collects information from an email and shows results in a...

Project iKy is a tool that collects information from an email and shows results in a nice visual interface.
One-Lin3r

One-Lin3r – Aid You In Penetration Testing Operations, Privilege Escalation And More

One-Lin3r is simple modular and light-weight framework gives you all the one-liners that you will need while penetration testing (Windows, Linux, macOS...
Sparta

SPARTA – Network Penetration Testing GUI Toolkit

SPARTA is GUI application developed with python and inbuild Network Penetration Testing Kali Linux tool. It simplifies scanning and enumeration phase with faster results.
Get Clients and Access Points

Airopy – Get Clients and Access Points with Alfa Cards

Get clients and access points. With Alfa cards, this script works correctly. Dependencies To run this...
vulnx

VulnX – Intelligent Bot Auto Shell Injector that detect vulnerabilities in multiple types of...

Vulnx is An Intelligent Bot Auto Shell Injector that detect vulnerabilities in multiple types of Cms, fast cms detection,informations gathering and vulnerabilitie Scanning of the...
salsa

Salsa Tools – An AV-Safe Reverse Shell dipped on bellota sauce

Salsa Tools is a collection of three different tools that combined, allows you to get a reverse shell on steroids in any...
objection

Objection – Runtime Mobile Exploration

introduction objection is a runtime mobile exploration toolkit, powered by Frida. It was built with the aim of helping assess mobile...
Linux Post Exploitation Framework

RedGhost – Linux Post Exploitation Framework Designed To Gain Persistence And Reconnaissance And Leave...

Linux post exploitation framework designed to assist red teams in gaining persistence, reconnaissance and leaving no trace.  Payloads...
URLextractor

URLextractor – Information Gathering and Website Reconnaissance

Information gathering & website reconnaissance Usage: ./extractor http://www.hackthissite.org/ Tips: Colorex: put colors to the...
trape

Trape – People tracker on the Internet (The evolution of phishing attacks) OSINT

Trape is a recognition tool that allows you to track people, the information you can get is very detailed. We want to teach...

Stay connected

0FansLike
0FollowersFollow
0FollowersFollow

Latest article

phishing simulation

Phishing Simulation – Aims To Increase Phishing Awareness By Providing An Intuitive Tutorial And...

Phishing Simulation mainly aims to increase phishing awareness by providing an intuitive tutorial and customized assessment (without any actual setup - no...
WiFiBroot

WiFiBroot – A WiFi Pentest Cracking Tool For WPA/WPA2

WiFiBroot is built to provide clients all-in-one facility for cracking WiFi (WPA/WPA2) networks. It heavily depends on scapy, a well-featured packet manipulation library...
GitHub Faces Class-Action Lawsuit

GitHub Faces Class-Action Lawsuit

Following the aftermath of Capital One breach happened earlier this week, the firms involved in the incident, in one or the other way, are...