Further cleanup of menu items
Mati Aharoni (Kali Linux Developer)
9 years ago
56 | 56 |
[org/gnome/desktop/app-folders/folders/forensics]
|
57 | 57 |
name='11-Forensics'
|
58 | 58 |
translate=true
|
59 | |
categories=['11-01-network-forensics','11-03-digital-forensics','11-04-forensic-analysis-tools','11-05-forensic-carving-tools','11-07-forensic-imaging-tools','11-11-pdf-forensics-tools','11-forensics']
|
|
59 |
categories=['11-01-network-forensics','11-03-digital-forensics','11-04-forensic-analysis-tools','11-05-forensic-carving-tools','11-07-forensic-imaging-tools','11-11-pdf-forensics-tools','11-forensics','11-08-forensic-suites']
|
60 | 60 |
|
61 | 61 |
[org/gnome/desktop/app-folders/folders/reporting]
|
62 | 62 |
name='12-Reporting'
|
0 | 0 |
[Desktop Entry]
|
1 | |
Name=• Password Profiling
|
|
1 |
Name=• Password Profiling & Wordlists
|
2 | 2 |
Name[fr]=Attaques Hors Connexion
|
3 | 3 |
Name[es]=Ataques sin Conexión
|
4 | 4 |
Name[hr]=Offline Napadi
|
0 | 0 |
[Desktop Entry]
|
1 | |
Name=• Network Spoofing
|
|
1 |
Name=• Spoofing and MITM
|
2 | 2 |
Name[fr]=Usurpation Réseau
|
3 | 3 |
Name[es]=Envenenamiento de Redes
|
4 | 4 |
Name[hr]=Spoofing
|
0 | 0 |
[Desktop Entry]
|
1 | |
Name=10 - Maintaining Access
|
|
1 |
Name=10 - Post Exploitation
|
2 | 2 |
Name[fr]=Maintien de l'Accès
|
3 | 3 |
Name[es]=Manteniendo Acceso
|
4 | 4 |
Name[hr]=Odrzavanje Pristupa
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=• Sleuth Kit Suite
|
|
2 |
Name[fr]=Suites Criminalistique
|
|
3 |
Name[es]=Suite de Forensia
|
|
4 |
Name[hr]=Forenzicki Paketi
|
|
5 |
Name[de]=Forensik-Werkzeugsammlungen
|
|
6 |
Name[it]=Suite Forensi
|
|
7 |
Name[zh_CN]=数字取证套件
|
|
8 |
Name[zh_HK]=數字取證套件
|
|
9 |
Name[zh_TW]=數字取證套件
|
|
10 |
Type=Directory
|
|
11 |
Icon=forensics-trans.png
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-forensics;
|
|
8 |
Categories=11-forensics;11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=autopsy
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-04-forensic-analysis-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-04-forensic-analysis-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-07-forensic-imaging-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-04-forensic-analysis-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=false
|
7 | 7 |
Type=Application
|
8 | |
Categories=03-webapp-analysis;
|
|
8 |
Categories=03-webapp-analysis;03-06-web-application-proxies;
|
9 | 9 |
X-Kali-Package=burpsuite
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=05-05-profile;
|
|
8 |
Categories=05-05-profile;05-password-attacks;
|
9 | 9 |
X-Kali-Package=cewl
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=06-01-cisco-attacks;02-01-cisco-tools;05-01-online-attacks;01-12-snmp-analysis;
|
|
8 |
Categories=06-01-cisco-attacks;02-01-cisco-tools;05-01-online-attacks;
|
9 | 9 |
X-Kali-Package=cisco-auditing-tool
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=06-01-cisco-attacks;02-01-cisco-tools;01-12-snmp-analysis;
|
|
8 |
Categories=06-01-cisco-attacks;02-01-cisco-tools;
|
9 | 9 |
X-Kali-Package=cisco-torch
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=01-12-snmp-analysis;02-02-01-cisco-tools;06-01-01-cisco-attacks;
|
|
8 |
Categories=02-01-cisco-tools;06-01-cisco-attacks;
|
9 | 9 |
X-Kali-Package=copy-router-config
|
|
0 |
[Desktop Entry]
|
|
1 |
Name=enum4linux
|
|
2 |
Encoding=UTF-8
|
|
3 |
Exec=sh -c "enum4linux;${SHELL:-bash}"
|
|
4 |
Icon=kali-menu.png
|
|
5 |
StartupNotify=false
|
|
6 |
Terminal=true
|
|
7 |
Type=Application
|
|
8 |
Categories=01-10-smb-analysis;
|
|
9 |
X-Kali-Package=enum4linux
|
|
10 |
|
|
11 |
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-04-forensic-analysis-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-04-forensic-analysis-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-forensics;
|
|
8 |
Categories=11-forensics;11-05-forensic-carving-tools;
|
9 | 9 |
X-Kali-Package=foremost
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-03-digital-forensics;11-07-forensic-imaging-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-04-forensic-analysis-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-04-forensic-analysis-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-04-forensic-analysis-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-04-forensic-analysis-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-07-forensic-imaging-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-07-forensic-imaging-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-04-forensic-analysis-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-04-forensic-analysis-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-05-forensic-carving-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=03-05-web-vulnerability-scanners;
|
|
8 |
Categories=03-01-cms-identification;03-05-web-vulnerability-scanners;
|
9 | 9 |
X-Kali-Package=joomscan
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-04-forensic-analysis-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=false
|
7 | 7 |
Type=Application
|
8 | |
Categories=01-info-gathering;
|
|
8 |
Categories=01-info-gathering;01-07-osint-analysis;
|
9 | 9 |
X-Kali-Package=maltego
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=01-12-snmp-analysis;02-02-01-cisco-tools;06-01-01-cisco-attacks;
|
|
8 |
Categories=02-01-cisco-tools;06-01-cisco-attacks;
|
9 | 9 |
X-Kali-Package=copy-router-config
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-04-forensic-analysis-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-07-forensic-imaging-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-07-forensic-imaging-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=01-info-gathering;
|
|
8 |
Categories=01-info-gathering;01-08-route-analysis;
|
9 | 9 |
X-Kali-Package=netdiscover
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=01-info-gathering;
|
|
8 |
Categories=01-info-gathering;01-04-network-scanners;
|
9 | 9 |
X-Kali-Package=nmap
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=false
|
7 | 7 |
Type=Application
|
8 | |
Categories=03-05-web-vulnerability-scanners;
|
|
8 |
Categories=03-06-web-application-proxies;
|
9 | 9 |
X-Kali-Package=proxystrike
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-04-forensic-analysis-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=03-05-web-vulnerability-scanners;
|
|
8 |
Categories=03-webapp-analysis;03-05-web-vulnerability-scanners;
|
9 | 9 |
X-Kali-Package=skipfish
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-04-forensic-analysis-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=03-webapp-analysis;
|
|
8 |
Categories=03-webapp-analysis;04-database-assessment;
|
9 | 9 |
X-Kali-Package=sqlmap
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-04-forensic-analysis-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=01-13-ssl-analysis;09-01-network-sniffers;
|
|
8 |
Categories=09-01-network-sniffers;
|
9 | 9 |
X-Kali-Package=sslsniff
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=01-13-ssl-analysis;10-02-tunneling;
|
|
8 |
Categories=10-02-tunneling;
|
9 | 9 |
X-Kali-Package=stunnel4
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-03-digital-forensics;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-07-forensic-imaging-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-03-digital-forensics;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=true
|
7 | 7 |
Type=Application
|
8 | |
Categories=11-04-forensic-analysis-tools;
|
|
8 |
Categories=11-08-forensic-suites;
|
9 | 9 |
X-Kali-Package=sleuthkit
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=false
|
7 | 7 |
Type=Application
|
8 | |
Categories=03-05-web-vulnerability-scanners;
|
|
8 |
Categories=03-04-web-crawlers;
|
9 | 9 |
X-Kali-Package=uniscan
|
desktop-files/kali-websploit.desktop
less
more
0 | |
[Desktop Entry]
|
1 | |
Name=websploit
|
2 | |
Encoding=UTF-8
|
3 | |
Exec=sh -c "websploit;${SHELL:-bash}"
|
4 | |
Icon=kali-menu.png
|
5 | |
StartupNotify=false
|
6 | |
Terminal=true
|
7 | |
Type=Application
|
8 | |
Categories=03-05-web-vulnerability-scanners;03-07-web-application-fuzzers;
|
9 | |
X-Kali-Package=websploit
|
1 | 1 |
Name=zenmap
|
2 | 2 |
Encoding=UTF-8
|
3 | 3 |
Exec=sh -c "zenmap;${SHELL:-bash}"
|
4 | |
Icon=kali-menu.png
|
|
4 |
Icon=/usr/share/zenmap/pixmaps/zenmap.png
|
5 | 5 |
StartupNotify=false
|
6 | 6 |
Terminal=false
|
7 | 7 |
Type=Application
|
8 | |
Categories=01-info-gathering;
|
|
8 |
Categories=01-info-gathering;01-04-network-scanners;
|
9 | 9 |
X-Kali-Package=zenmap
|
381 | 381 |
</And></Include>
|
382 | 382 |
|
383 | 383 |
<Menu>
|
|
384 |
<Name>PDF Forensics Tools</Name>
|
|
385 |
<Directory>11-11-pdf-forensics-tools.directory</Directory>
|
|
386 |
<Include><And>
|
|
387 |
<Category>11-11-pdf-forensics-tools</Category>
|
|
388 |
</And></Include>
|
|
389 |
</Menu>
|
|
390 |
|
|
391 |
<Menu>
|
|
392 |
<Name>Forensics Analysis Suites</Name>
|
|
393 |
<Directory>11-08-forensic-suites.directory</Directory>
|
|
394 |
<Include><And>
|
|
395 |
<Category>11-08-forensic-suites</Category>
|
|
396 |
</And></Include>
|
|
397 |
</Menu>
|
|
398 |
|
|
399 |
|
|
400 |
<Menu>
|
384 | 401 |
<Name>Digital Forensics</Name>
|
385 | 402 |
<Directory>11-03-digital-forensics.directory</Directory>
|
386 | 403 |
<Include><And>
|
387 | 404 |
<Category>11-03-digital-forensics</Category>
|
388 | 405 |
</And></Include>
|
389 | |
</Menu>
|
390 | |
|
391 | |
<Menu>
|
392 | |
<Name>PDF Forensics Tools</Name>
|
393 | |
<Directory>11-11-pdf-forensics-tools.directory</Directory>
|
394 | |
<Include><And>
|
395 | |
<Category>11-11-pdf-forensics-tools</Category>
|
396 | |
</And></Include>
|
397 | |
</Menu>
|
398 | |
|
399 | |
<Menu>
|
400 | |
<Name>Forensic Analysis Tools</Name>
|
401 | |
<Directory>11-04-forensic-analysis-tools.directory</Directory>
|
402 | 406 |
<Include><And>
|
403 | 407 |
<Category>11-04-forensic-analysis-tools</Category>
|
404 | 408 |
</And></Include>
|