All Projects → RC-exploiter → Similar Projects or Alternatives

196 Open source projects that are alternatives of or similar to RC-exploiter

Aggressor
Ladon for Cobalt Strike, Large Network Penetration Scanner, vulnerability / exploit / detection / MS17010 / password/brute-force/psexec/atexec/sshexec/webshell/smbexec/netcat/osscan/netscan/struts2Poc/weblogicExp
Stars: ✭ 228 (+356%)
Mutual labels:  brute-force
Faceboom
A Python script for Brute Force Attack On Facebook Account :)
Stars: ✭ 194 (+288%)
Mutual labels:  brute-force
brutekrag
Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.
Stars: ✭ 30 (-40%)
Mutual labels:  brute-force
ssh brute force
Crack SSH Password using Dictionary and Brute Force Method
Stars: ✭ 51 (+2%)
Mutual labels:  brute-force
Spypi
An (un-)ethical hacking-station based on Raspberry Pi and Python
Stars: ✭ 167 (+234%)
Mutual labels:  brute-force
docker-metasploit
Metasploit framework with steroids
Stars: ✭ 49 (-2%)
Mutual labels:  metasploit
Ladon
大型内网渗透扫描器&Cobalt Strike,Ladon8.9内置120个模块,包含信息收集/存活主机/端口扫描/服务识别/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010/SMBGhost/Weblogic/ActiveMQ/Tomcat/Struts2,密码口令爆破(Mysql/Oracle/MSSQL)/FTP/SSH(Linux)/VNC/Windows(IPC/WMI/SMB/Netbios/LDAP/SmbHash/WmiHash/Winrm),远程执行命令(smbexec/wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0
Stars: ✭ 2,911 (+5722%)
Mutual labels:  brute-force
backtrex
Backtracking behaviour to solve discrete problems by brute force
Stars: ✭ 22 (-56%)
Mutual labels:  brute-force
Filebuster
An extremely fast and flexible web fuzzer
Stars: ✭ 176 (+252%)
Mutual labels:  brute-force
Andspoilt
Run interactive android exploits in linux.
Stars: ✭ 101 (+102%)
Mutual labels:  metasploit
phpmyadmin-authentication-bruteforce
phpMyAdmin Authentication Bruteforce Tool
Stars: ✭ 58 (+16%)
Mutual labels:  brute-force
Pydictor
A powerful and useful hacker dictionary builder for a brute-force attack
Stars: ✭ 2,055 (+4010%)
Mutual labels:  brute-force
GmailBruterV2
Simple tool written in python3 to perform limited brute-force attacks on gmail accounts.
Stars: ✭ 264 (+428%)
Mutual labels:  brute-force
Terminhack
👨‍💻 Impress your friends by pretending to be a real hacker
Stars: ✭ 73 (+46%)
Mutual labels:  metasploit
ivre
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,712 (+5324%)
Mutual labels:  nmap-scripts
Brutedum
BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack
Stars: ✭ 212 (+324%)
Mutual labels:  brute-force
PUPI
🛅 Passwords using personal information
Stars: ✭ 65 (+30%)
Mutual labels:  brute-force
Filevaultcracker
macOS FileVault cracking tool
Stars: ✭ 199 (+298%)
Mutual labels:  brute-force
rbuster
yet another dirbuster
Stars: ✭ 21 (-58%)
Mutual labels:  brute-force
H4rpy
Automated WPA/WPA2 PSK attack tool.
Stars: ✭ 185 (+270%)
Mutual labels:  brute-force
JALSI
JALSI - Just Another Lame Shellcode Injector
Stars: ✭ 29 (-42%)
Mutual labels:  metasploit
Content Bruteforcing Wordlist
Wordlist for content(directory) bruteforce discovering with Burp or dirsearch
Stars: ✭ 173 (+246%)
Mutual labels:  brute-force
nmapvision
This tool is for detecting all what NMAP does if someone wants to hack you and expose the scanning from where by IP ADDRESS and the exact time for analysis and convert it automatically in logsfile
Stars: ✭ 28 (-44%)
Mutual labels:  nmap-scripts
T14m4t
Automated brute-forcing attack tool.
Stars: ✭ 160 (+220%)
Mutual labels:  brute-force
Credit-Card-Bruteforcer
Hacks credit card PAN numbers by using partial Hashes, and a list of random PAN [pins]
Stars: ✭ 50 (+0%)
Mutual labels:  brute-force
scemu
x86 malware emulator
Stars: ✭ 150 (+200%)
Mutual labels:  metasploit
Minimalistic Offensive Security Tools
A repository of tools for pentesting of restricted and isolated environments.
Stars: ✭ 135 (+170%)
Mutual labels:  brute-force
Z0172CK-Tools
Hacking Tools Z0172CK
Stars: ✭ 31 (-38%)
Mutual labels:  metasploit
SSH-PuTTY-login-bruteforcer
Turn PuTTY into an SSH login bruteforcing tool.
Stars: ✭ 222 (+344%)
Mutual labels:  brute-force
trolo
trolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-10%)
Mutual labels:  metasploit
Knock
🔑 Scan the entire internet for SSH and Telnet services. Then hack them.
Stars: ✭ 60 (+20%)
Mutual labels:  brute-force
Brute-Force-Login
Proof -Of-Concept Brute Force Login on a web-site with a good dictionary of words
Stars: ✭ 231 (+362%)
Mutual labels:  brute-force
Hatch
Hatch is a brute force tool that is used to brute force most websites
Stars: ✭ 242 (+384%)
Mutual labels:  brute-force
Brutegram
Instagram multi-bruteforce Platfrom
Stars: ✭ 183 (+266%)
Mutual labels:  brute-force
Patator
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
Stars: ✭ 2,792 (+5484%)
Mutual labels:  brute-force
DevBrute-A Password Brute Forcer
DevBrute is a Password Brute Forcer, It can Brute Force almost all Social Media Accounts or Any Web Application.
Stars: ✭ 91 (+82%)
Mutual labels:  brute-force
Pandwarf
PandwaRF: RF analysis tool with a sub-1 GHz wireless transceiver controlled by a smartphone or
Stars: ✭ 206 (+312%)
Mutual labels:  brute-force
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (+1102%)
Mutual labels:  metasploit
Limitrr
Light NodeJS rate limiting and response delaying using Redis - including Express middleware.
Stars: ✭ 203 (+306%)
Mutual labels:  brute-force
gentle-force
Brute-force, error and request rate limiting
Stars: ✭ 45 (-10%)
Mutual labels:  brute-force
Isect
Segments intersection detection library
Stars: ✭ 199 (+298%)
Mutual labels:  brute-force
password-list
Password lists with top passwords to optimize bruteforce attacks
Stars: ✭ 174 (+248%)
Mutual labels:  brute-force
Stegseek
⚡️ Worlds fastest steghide cracker, chewing through millions of passwords per second ⚡️
Stars: ✭ 187 (+274%)
Mutual labels:  brute-force
default-http-login-hunter
Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.
Stars: ✭ 285 (+470%)
Mutual labels:  nmap-scripts
Snmpwn
An SNMPv3 User Enumerator and Attack tool
Stars: ✭ 183 (+266%)
Mutual labels:  brute-force
nmap-log4shell
Nmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)
Stars: ✭ 54 (+8%)
Mutual labels:  nmap-scripts
Pulse
Brute Force For Facebook,Instagram & Twitter
Stars: ✭ 173 (+246%)
Mutual labels:  brute-force
Drupalgeddon3
Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)
Stars: ✭ 18 (-64%)
Mutual labels:  metasploit
Dymerge
🔓 A dynamic dictionary merger for successful dictionary based attacks.
Stars: ✭ 167 (+234%)
Mutual labels:  brute-force
psolving-paradigms
Common problems of dynamic programming methods and techniques, including prerequisites, for competitive programmers.
Stars: ✭ 34 (-32%)
Mutual labels:  brute-force
Enumdb
Relational database brute force and post exploitation tool for MySQL and MSSQL
Stars: ✭ 167 (+234%)
Mutual labels:  brute-force
Telegram User Number Finder
Find the phone number of any telegram users
Stars: ✭ 232 (+364%)
Mutual labels:  brute-force
3d Bin Container Packing
A variant of the Largest Area Fit First (LAFF) algorithm + brute force algorithm
Stars: ✭ 145 (+190%)
Mutual labels:  brute-force
urlbuster
Powerful mutable web directory fuzzer to bruteforce existing and/or hidden files or directories.
Stars: ✭ 144 (+188%)
Mutual labels:  brute-force
weakpass generator
generates weak passwords based on current date
Stars: ✭ 36 (-28%)
Mutual labels:  brute-force
REW-sploit
Emulate and Dissect MSF and *other* attacks
Stars: ✭ 115 (+130%)
Mutual labels:  metasploit
moac
Generate passwords and analyze their strength given physical limits to computation
Stars: ✭ 16 (-68%)
Mutual labels:  brute-force
WPCracker
WordPress pentest tool
Stars: ✭ 34 (-32%)
Mutual labels:  brute-force
orbitaldump
A simple multi-threaded distributed SSH brute-forcing tool written in Python
Stars: ✭ 405 (+710%)
Mutual labels:  brute-force
CnC-detection
Detecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation
Stars: ✭ 15 (-70%)
Mutual labels:  metasploit
1-60 of 196 similar projects