AggressorLadon for Cobalt Strike, Large Network Penetration Scanner, vulnerability / exploit / detection / MS17010 / password/brute-force/psexec/atexec/sshexec/webshell/smbexec/netcat/osscan/netscan/struts2Poc/weblogicExp
Stars: ✭ 228 (+356%)
FaceboomA Python script for Brute Force Attack On Facebook Account :)
Stars: ✭ 194 (+288%)
brutekragPenetration tests on SSH servers using brute force or dictionary attacks. Written in Python.
Stars: ✭ 30 (-40%)
ssh brute forceCrack SSH Password using Dictionary and Brute Force Method
Stars: ✭ 51 (+2%)
SpypiAn (un-)ethical hacking-station based on Raspberry Pi and Python
Stars: ✭ 167 (+234%)
Ladon大型内网渗透扫描器&Cobalt Strike,Ladon8.9内置120个模块,包含信息收集/存活主机/端口扫描/服务识别/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010/SMBGhost/Weblogic/ActiveMQ/Tomcat/Struts2,密码口令爆破(Mysql/Oracle/MSSQL)/FTP/SSH(Linux)/VNC/Windows(IPC/WMI/SMB/Netbios/LDAP/SmbHash/WmiHash/Winrm),远程执行命令(smbexec/wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0
Stars: ✭ 2,911 (+5722%)
backtrexBacktracking behaviour to solve discrete problems by brute force
Stars: ✭ 22 (-56%)
FilebusterAn extremely fast and flexible web fuzzer
Stars: ✭ 176 (+252%)
AndspoiltRun interactive android exploits in linux.
Stars: ✭ 101 (+102%)
PydictorA powerful and useful hacker dictionary builder for a brute-force attack
Stars: ✭ 2,055 (+4010%)
GmailBruterV2Simple tool written in python3 to perform limited brute-force attacks on gmail accounts.
Stars: ✭ 264 (+428%)
Terminhack👨💻 Impress your friends by pretending to be a real hacker
Stars: ✭ 73 (+46%)
ivreNetwork recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,712 (+5324%)
BrutedumBruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack
Stars: ✭ 212 (+324%)
PUPI🛅 Passwords using personal information
Stars: ✭ 65 (+30%)
rbusteryet another dirbuster
Stars: ✭ 21 (-58%)
H4rpyAutomated WPA/WPA2 PSK attack tool.
Stars: ✭ 185 (+270%)
JALSIJALSI - Just Another Lame Shellcode Injector
Stars: ✭ 29 (-42%)
nmapvisionThis tool is for detecting all what NMAP does if someone wants to hack you and expose the scanning from where by IP ADDRESS and the exact time for analysis and convert it automatically in logsfile
Stars: ✭ 28 (-44%)
T14m4tAutomated brute-forcing attack tool.
Stars: ✭ 160 (+220%)
Credit-Card-BruteforcerHacks credit card PAN numbers by using partial Hashes, and a list of random PAN [pins]
Stars: ✭ 50 (+0%)
scemux86 malware emulator
Stars: ✭ 150 (+200%)
trolotrolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-10%)
Knock🔑 Scan the entire internet for SSH and Telnet services. Then hack them.
Stars: ✭ 60 (+20%)
Brute-Force-LoginProof -Of-Concept Brute Force Login on a web-site with a good dictionary of words
Stars: ✭ 231 (+362%)
HatchHatch is a brute force tool that is used to brute force most websites
Stars: ✭ 242 (+384%)
BrutegramInstagram multi-bruteforce Platfrom
Stars: ✭ 183 (+266%)
PatatorPatator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
Stars: ✭ 2,792 (+5484%)
DevBrute-A Password Brute ForcerDevBrute is a Password Brute Forcer, It can Brute Force almost all Social Media Accounts or Any Web Application.
Stars: ✭ 91 (+82%)
PandwarfPandwaRF: RF analysis tool with a sub-1 GHz wireless transceiver controlled by a smartphone or
Stars: ✭ 206 (+312%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (+1102%)
LimitrrLight NodeJS rate limiting and response delaying using Redis - including Express middleware.
Stars: ✭ 203 (+306%)
gentle-forceBrute-force, error and request rate limiting
Stars: ✭ 45 (-10%)
IsectSegments intersection detection library
Stars: ✭ 199 (+298%)
password-listPassword lists with top passwords to optimize bruteforce attacks
Stars: ✭ 174 (+248%)
Stegseek⚡️ Worlds fastest steghide cracker, chewing through millions of passwords per second ⚡️
Stars: ✭ 187 (+274%)
default-http-login-hunterLogin hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.
Stars: ✭ 285 (+470%)
SnmpwnAn SNMPv3 User Enumerator and Attack tool
Stars: ✭ 183 (+266%)
nmap-log4shellNmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)
Stars: ✭ 54 (+8%)
PulseBrute Force For Facebook,Instagram & Twitter
Stars: ✭ 173 (+246%)
Drupalgeddon3Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)
Stars: ✭ 18 (-64%)
Dymerge🔓 A dynamic dictionary merger for successful dictionary based attacks.
Stars: ✭ 167 (+234%)
psolving-paradigmsCommon problems of dynamic programming methods and techniques, including prerequisites, for competitive programmers.
Stars: ✭ 34 (-32%)
EnumdbRelational database brute force and post exploitation tool for MySQL and MSSQL
Stars: ✭ 167 (+234%)
3d Bin Container PackingA variant of the Largest Area Fit First (LAFF) algorithm + brute force algorithm
Stars: ✭ 145 (+190%)
urlbusterPowerful mutable web directory fuzzer to bruteforce existing and/or hidden files or directories.
Stars: ✭ 144 (+188%)
REW-sploitEmulate and Dissect MSF and *other* attacks
Stars: ✭ 115 (+130%)
moacGenerate passwords and analyze their strength given physical limits to computation
Stars: ✭ 16 (-68%)
WPCrackerWordPress pentest tool
Stars: ✭ 34 (-32%)
orbitaldumpA simple multi-threaded distributed SSH brute-forcing tool written in Python
Stars: ✭ 405 (+710%)
CnC-detectionDetecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation
Stars: ✭ 15 (-70%)