Skip to content
View kefkahacks's full-sized avatar

Block or report kefkahacks

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
26 stars written in Shell
Clear filter

Manage your app's Ruby environment

Shell 16,578 1,425 Updated Oct 11, 2025

Attack Surface Management Platform

Shell 9,186 1,993 Updated Sep 27, 2025

Scripted Local Linux Enumeration & Privilege Escalation Checks

Shell 7,676 2,028 Updated Sep 6, 2023

A short tutorial about building Linux based operating systems.

Shell 5,212 336 Updated Jun 3, 2024

Easing the building of vagrant boxes

Shell 4,278 771 Updated Sep 17, 2018

The LAZY script will make your life easier, and of course faster.

Shell 4,261 1,087 Updated Aug 28, 2021

grep rough audit - source code auditing tool

Shell 1,658 252 Updated May 22, 2025

A curated list of the most common and most interesting robots.txt disallowed directories.

Shell 1,475 302 Updated Aug 22, 2022

Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and …

Shell 1,236 272 Updated Jan 23, 2018

Self contained htaccess shells and attacks

Shell 1,064 193 Updated Feb 17, 2022

You can use setupTermuxArch.bash 📲 to install Arch Linux in Termux on Amazon, Android, Chromebook and Windows. https://sdrausty.github.io/termux-archlinux/

Shell 778 73 Updated Oct 31, 2022

This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it w…

Shell 736 165 Updated Sep 1, 2022

Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer Overflow

Shell 439 119 Updated Jul 11, 2017

hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script with no specified options will query ARIN and a pool of BGP route servers. The ro…

Shell 371 57 Updated Feb 4, 2022

A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing

Shell 359 63 Updated Aug 24, 2025

This is a weaponized WSUS exploit

Shell 295 45 Updated Nov 25, 2022
Shell 284 97 Updated Sep 19, 2014

An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.

Shell 201 42 Updated Aug 29, 2016

TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!

Shell 97 35 Updated May 12, 2018

IPV6 MITM attack tool

Shell 92 30 Updated Aug 7, 2013

Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.

Shell 84 19 Updated May 10, 2018

Offensives network security framework for Wireless and MiTM style hacking

Shell 61 18 Updated Oct 9, 2017

A collection of veewee definitions of Vagrant boxes

Shell 5 4 Updated Dec 15, 2013

Post information gathering for linux

Shell 4 Updated Jul 4, 2017

Compatible with new Kali builds. No tweaks required.

Shell 3 Updated Jul 2, 2018