Found 135 repositories(showing 30)
Hackingzone
to grab or steal the password of systemAutomated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords Download git clone https://github.com/pourquoibenoit/WinPirate.git This project is still in progress Estimated Completion Date: soon…ish Here’s the plan. We create a way to automate doing the sticky keys windows hack from a bootable USB. Then, we automate getting as many saved passwords as possible, drop a listener, and delete all traces that we were there. All without being detected by antivirus we should add a mimikittenz option if the computer was found running and unlocked, otherwise we can just run it later remotely How to Use Requirements: a linux bootable USB, this repo on the USB (not in the OS, just put it in the root directory) chromepasswords.py requires PyWin32 If the computer is locked: 1) shutdown windows (make sure not hibernating by holding shift while pressing shut down) 2) hit F12 and select USB 3) sudo -i 4) fdisk -l (note: if you’re on Kali Linux, run parted -l) 5) mkdir /media/windows 6) mount /dev/WHATEVERTHEWINDOWSPARTITIONWASCALLED /media/windows -t ntfs 7) run Stickykeys.sh 8) restart and boot to Windows 9) hit Shift 5 times fast, a command prompt will appear 10) cd to the USB and run WinPirate.bat If the computer isn’t locked: cd to the USB and run Run.bat (this will run WinPirate.bat silently in the background, it should be done in < 10 seconds Current Issues 1) The chrome passwords grabber that I made is still a .py For it to work, I need to convert it to exe so it doesn’t require python to be installed on the system. You can run it with python chromepasswords.py -csv and it will decrypt the Chrome saved passwords database and export it as a CSV 2) The sticky keys automation doesn’t speed the process up as much as I previously thought, as evident by the lengthy “How to Use” section 3) I haven’t been able to write any tools that grab passwords for IE or Firefox Source: https://github.com/pourquoibenoit/WinPirate
offensive-security
Kali Linux u-boot images
mvster-p
Bootable Kali Linux USB with OpenClaw AI automation. Portable penetration testing rig with pre-configured workflows, auto-documentation, and drop-box node deployment. Boot anywhere, pentest everything, leave no trace.
Omolabake94
This is an intensive 24-week long boot camp program. Skills learned consist of Wireshark, Kali Linux, Metasploit, Burp Suite, Elk Stack, Splunk and alot more which is showcased in the included Projects and Homework in this Repo and also training towards Security+, Network+, and CISSP certifications
nonkronk
All necessary files in EFI partition to get Mac OS X (Hackintosh) + Kali Linux (without GRUB) + Windows triple-boot working in single HDD/SSD with Clover Bootloader.
feralfenrir
Tutorial to create a bootable Kali USB drive with persistent storage.
rioloc
This guide aims to explain how to make a live Kali USB bootable for a Mac Hardware. Solving all problems related to EFI boot manager.
TheCjw
Running Kali Linux With Secure Boot
kasuncsb
By default, Kali Linux cannot run on systems with Secure Boot enabled. This guide helps to mitigate that.
atarii
Re-generate SSH keys and enable SSH service to run on boot (for use on Kali VMs)
kilianbalaguer
🚀 Quad-boot OpenCore Hackintosh for HP ZBook Fury 15 G7 – macOS 26 Tahoe Beta, Windows 11, Ubuntu & Kali with full 4K HiDPI, touchscreen, Wi-Fi, sleep, and recovery fixes.
Nixon-H
Kali Chroot Manager: Run Kali Linux tools on stable Debian 13 without the instability. This automated script creates an isolated Kali environment using debootstrap; no VMs, no dual-boot, no system breakage. Access penetration testing tools instantly while keeping your Debian rock-solid and production-ready.
allanbreyes
Bootstrap a disposable, repeatable Kali virtual machine
OverpoweredCoding
No description available
techghoshal
Fix: Windows not showing in grub boot menu | kali Linux
hawk-xc
A boot menu in Kali Linux “Live” allows users to enable persistent storage – retaining data on a USB drive on the boot up process – across reboots of the “Kali Live” OS. Persistent data are stored on a USB drive in an unexciting partition that can also have LUKS-encryption enabled.
Hnibbo
⚡ The Ultimate Termux PXE Boot Solution for Arch Linux with Kali-like UI and Performance Optimizations. Cross-platform compatible, no root required, steroid-level performance!
sauravsinha239
Plymouth theme
aingram702
Step-by-step guide to create a dual-boot system using Kali Linux and Windows 10.
temanhattan
Run this script when you boot your kali machine for the first time ;)
g0dm0de1337
On VMware Workstation Pro 17 boot kali linux with working "monitor mode", when your wifi-stick is connected to the virtual machine
kalise7en
A portable customizable pc in a laptop architecture. Housed in a weather proof case a PI 5, 65,000 mAh power bank, 10" touch screen, and 2tb ssd usb boot work together to run Kali Linux and operate as a independent pen-testing tool. With wifi adapters and a sdr this machine is able to conduct deauth attacks along with scanning most radio freqis.
shailendra9559
it make bootable pendrive using .sh script and it doess not require to install any other package to install it just use dd and other system commands to do so
borari
Ansible Playbook to quickly stand up a personalized Kali system.
shobinja
Auto Booting to Kali as a root user for the VNC Server
chmod-x-Tieupsh
Bootstrap Kali-Nethunter
amohar
My fork of the Kali Live Configuration for creating custom Kali bootable USB drives
RamadhanAlfatih
A detailed guide on resizing the disk space for Kali Linux in a dual-boot setup with Windows, using GParted on an Ubuntu Live USB. Includes steps for creating unallocated space in Windows, booting via a live USB, and extending the Linux partition.
No description available
scaryshark124
I will demonstrate how to use debootstrap to build Kali Linux on a USB thumb drive. While in chroot, I will demonstrate how to compile grub2 with ArchLinux's grub-improved-luks2 that allows me to encrypt the root system with argon2id password hashing algorithm. Lastly, I will create machine owner key (MOK) to sign grub bootloader and vmlinuz.