All Projects → ArchStrike → Archstrike

ArchStrike / Archstrike

Licence: gpl-3.0
An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to Archstrike

Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-84.54%)
Mutual labels:  hacking, pentesting, penetration-testing, security-audit
Pentestkit
Useful tools and scripts during Penetration Testing engagements
Stars: ✭ 463 (+15.46%)
Mutual labels:  hacking, pentesting, penetration-testing, tools
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-4.74%)
Mutual labels:  hacking, pentesting, penetration-testing, tools
Habu
Hacking Toolkit
Stars: ✭ 635 (+58.35%)
Mutual labels:  hacking, pentesting, penetration-testing, security-audit
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-54.61%)
Mutual labels:  hacking, pentesting, penetration-testing, security-audit
Cameradar
Cameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+592.02%)
Mutual labels:  hacking, pentesting, penetration-testing
Rspet
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Stars: ✭ 251 (-37.41%)
Mutual labels:  hacking, pentesting, security-audit
Compute Engine
Highly optimized inference engine for Binarized Neural Networks
Stars: ✭ 138 (-65.59%)
Mutual labels:  raspberry-pi, armv7, armv8
Badkarma
network reconnaissance toolkit
Stars: ✭ 353 (-11.97%)
Mutual labels:  hacking, penetration-testing, security-audit
Hrshell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (-51.87%)
Mutual labels:  hacking, pentesting, penetration-testing
Pieman
Script for creating custom OS images for single-board computers
Stars: ✭ 149 (-62.84%)
Mutual labels:  raspberry-pi, armv7, armv8
W5
Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (-8.48%)
Mutual labels:  hacking, security-audit, tools
Capsulecorp Pentest
Vagrant VirtualBox environment for conducting an internal network penetration test
Stars: ✭ 214 (-46.63%)
Mutual labels:  hacking, pentesting, penetration-testing
Evil Ssdp
Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.
Stars: ✭ 204 (-49.13%)
Mutual labels:  hacking, pentesting, penetration-testing
Nmap
Idiomatic nmap library for go developers
Stars: ✭ 391 (-2.49%)
Mutual labels:  hacking, pentesting, penetration-testing
Fdsploit
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (-50.37%)
Mutual labels:  hacking, pentesting, penetration-testing
Arm Assembly Cheat
MOVED TO: https://github.com/cirosantilli/linux-kernel-module-cheat#userland-assembly SEE README. ARMv7 and ARMv8 assembly userland minimal examples tutorial. Runnable asserts on x86 hosts with QEMU user mode or natively on ARM targets. Nice GDB step debug setup. Tested on Ubuntu 18.04 host and Raspberry Pi 2 and 3 targets.
Stars: ✭ 159 (-60.35%)
Mutual labels:  raspberry-pi, armv7, armv8
Faraday
Faraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit.
Stars: ✭ 3,198 (+697.51%)
Mutual labels:  pentesting, penetration-testing, security-audit
Arachni
Web Application Security Scanner Framework
Stars: ✭ 2,942 (+633.67%)
Mutual labels:  hacking, penetration-testing, security-audit
Infosec reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+937.91%)
Mutual labels:  hacking, pentesting, penetration-testing

ArchStrike

logo

An Arch Linux repository for security professionals and enthusiasts.

Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7, and ARMv8.

Our website

Our Twitter

ArchStrike is a penetration testing and security repository for users of Arch Linux, following Arch Linux standards to keep our packages clean, proper, and easy to maintain.

We do our best to maintain the repository and give users a quality ArchStrike experience.

Please contact us if issues are encountered via github, IRC, twitter, or email - we welcome feedback that helps us improve.

Contact Info

Email: [email protected]

Internet Relay Chat (IRC): irc://chat.freenode.net/#archstrike

Twitter: https://twitter.com/ArchStrike

Pull request: https://github.com/ArchStrike/ArchStrike

Reddit: https://reddit.com/r/archstrike

Please read our wiki pages before you ask something!

Contributing

Contributions are welcome. You can contribute through pull requests (PRs) via our github page

Just clone our repository with git clone https://github.com/ArchStrike/ArchStrike.git, make changes, and submit via a pull request.

If you have more questions regarding contribution, you can check out our wiki page about this

FAQ

Q1: What's the difference between ArchStrike and other security-based repositories?

A: We try and follow the Arch Linux standards when making our packages, so they can install or remove easily without affecting an existing Arch Linux installation. Basically, you can use the repository as an extension to your already existing Arch Linux repositories.

Q2: Where can I download an ISO/OVA file?

A: You can download the latest releases from here.

NOTE: We're trying to consolidate our main and testing repositories while Arch Linux is in the process of meeting the Python 2 EOL timeline. So, the ISO and OVA files might be outdated.

Q3: How can I contact you?

A: See Contact Info above.

Q4: I am having trouble installing ArchStrike, can you help me?

A: Yes! Our contact information is above.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].