Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/slavetomints/rvc_hacking_toolbox
100% Ruby CLI Hacking Toolbox
https://github.com/slavetomints/rvc_hacking_toolbox
cybersecuirty hacking hacking-tool ruby
Last synced: 10 days ago
JSON representation
100% Ruby CLI Hacking Toolbox
- Host: GitHub
- URL: https://github.com/slavetomints/rvc_hacking_toolbox
- Owner: Slavetomints
- Created: 2024-09-11T15:03:04.000Z (2 months ago)
- Default Branch: main
- Last Pushed: 2024-11-02T18:15:10.000Z (15 days ago)
- Last Synced: 2024-11-02T19:19:59.463Z (14 days ago)
- Topics: cybersecuirty, hacking, hacking-tool, ruby
- Language: Ruby
- Homepage:
- Size: 146 KB
- Stars: 7
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: docs/README.md
Awesome Lists containing this project
README
# RVC HACKING TOOLBOX
[![CodeQL](https://github.com/Slavetomints/rvc_hacking_toolbox/actions/workflows/github-code-scanning/codeql/badge.svg)](https://github.com/Slavetomints/rvc_hacking_toolbox/actions/workflows/github-code-scanning/codeql) ![Static Badge](https://img.shields.io/badge/RELEASE-v0.4.1-blue) ![Static Badge](https://img.shields.io/badge/LICENSE-MIT-green)
## Installation/Getting Started
First clone the repository and go into it
```sh
git clone https://github.com/Slavetomints/rvc_hacking_toolbox.gitcd rvc_hacking_toolbox
```Then install the dependencies
```sh
bundle install
```Then run the program!
```sh
ruby main.rb
```## Extras
Usage guide can be found at [Usage](USAGE.md)
The changelog/version history with patch notes can be found [here](CHANGELOG.md)
The structure of the program can be found at [Structure](STRUCTURE.md)
This program uses a MIT License, that can be found [here](LICENSE)
## Development Status
### Boilerplate Code
- Open Source Intelligence
- Network Traffic Analysis
- Scanning & Reconnaissance
- Wireless Access Exploitation
- Enumeration & Exploitation### In Planning
- Forensics
### In Development
- Open Source Intelligence
- Password Cracking
- Documentation### Completed
- Cryptography
- Web Application Exploitation
- Log Analysis