PlutusAn automated bitcoin wallet collider that brute forces random wallet addresses
Stars: ✭ 404 (+120.77%)
PydictorA powerful and useful hacker dictionary builder for a brute-force attack
Stars: ✭ 2,055 (+1022.95%)
WPCrackerWordPress pentest tool
Stars: ✭ 34 (-81.42%)
Socialbox TermuxSocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By init__0 for termux on android
Stars: ✭ 324 (+77.05%)
Shodan-RPiA simple SSH bruteforce script targeting (not necessarily) Raspbian devices.
Stars: ✭ 13 (-92.9%)
Jwt CrackerSimple HS256 JWT token brute force cracker
Stars: ✭ 365 (+99.45%)
psolving-paradigmsCommon problems of dynamic programming methods and techniques, including prerequisites, for competitive programmers.
Stars: ✭ 34 (-81.42%)
HackphilesBruteForce Tool For both Instagram and Facebook
Stars: ✭ 57 (-68.85%)
password-listPassword lists with top passwords to optimize bruteforce attacks
Stars: ✭ 174 (-4.92%)
instabruteInstagram Brute Forcer
Stars: ✭ 135 (-26.23%)
BrutexAutomatically brute force all services running on a target.
Stars: ✭ 974 (+432.24%)
DirsearchWeb path scanner
Stars: ✭ 7,246 (+3859.56%)
urlbusterPowerful mutable web directory fuzzer to bruteforce existing and/or hidden files or directories.
Stars: ✭ 144 (-21.31%)
Bitcoin-wallet-crackerAutomated Bitcoin wallet generator that with mnemonic and passphrases bruteforces wallet addresses
Stars: ✭ 140 (-23.5%)
uberscanSecurity program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.
Stars: ✭ 31 (-83.06%)
Web BrutatorFast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-46.99%)
XbruteforcerX Brute Forcer Tool 🔓 WordPress , Joomla , DruPal , OpenCart , Magento
Stars: ✭ 261 (+42.62%)
InstabruteInstagram password bruteforcer
Stars: ✭ 91 (-50.27%)
AvaxAVAX is a small, modern and fast console application for decrypting passwords with certain options.
Stars: ✭ 19 (-89.62%)
PUPI🛅 Passwords using personal information
Stars: ✭ 65 (-64.48%)
Koa2 RatelimitRate-limiting middleware for Koa2 ES6. Use to limit repeated requests to APIs and/or endpoints such as password reset.
Stars: ✭ 81 (-55.74%)
Brute-Force-LoginProof -Of-Concept Brute Force Login on a web-site with a good dictionary of words
Stars: ✭ 231 (+26.23%)
Faitagram(Doesn't work anymore)
Stars: ✭ 117 (-36.07%)
SsbSecure Shell Bruteforcer — A faster & simpler way to bruteforce SSH server
Stars: ✭ 832 (+354.64%)
d00rSimple directory brute-force tool written with python.
Stars: ✭ 35 (-80.87%)
InstahackInstagram bruteforce tool
Stars: ✭ 265 (+44.81%)
H4rpyAutomated WPA/WPA2 PSK attack tool.
Stars: ✭ 185 (+1.09%)
ElpscrkA Common User Passwords generator script that looks like the tool Eliot used it in Mr.Robot Series Episode 01 :D :v
Stars: ✭ 113 (-38.25%)
BrutegramInstagram multi-bruteforce Platfrom
Stars: ✭ 183 (+0%)
BlazyBlazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .
Stars: ✭ 637 (+248.09%)
Bitp0wnAlgorithms to re-compute a private key, to fake signatures and some other funny things with Bitcoin.
Stars: ✭ 59 (-67.76%)
T14m4tAutomated brute-forcing attack tool.
Stars: ✭ 160 (-12.57%)
Free adv trainOfficial TensorFlow Implementation of Adversarial Training for Free! which trains robust models at no extra cost compared to natural training.
Stars: ✭ 127 (-30.6%)
Instagram HackerThis is an advanced script for Instagram bruteforce attacks. WARNING THIS IS A REAL TOOL!
Stars: ✭ 156 (-14.75%)
Node Rate Limiter FlexibleNode.js rate limit requests by key with atomic increments in single process or distributed environment.
Stars: ✭ 1,950 (+965.57%)
DagonAdvanced Hash Manipulation
Stars: ✭ 155 (-15.3%)
GoaltdnsA permutation generation tool written in golang
Stars: ✭ 119 (-34.97%)
Yotteryotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage
Stars: ✭ 118 (-35.52%)
AtomicpurpleteamAtomic Purple Team Framework and Lifecycle
Stars: ✭ 155 (-15.3%)
Oscp AutomationA collection of personal scripts used in hacking excercises.
Stars: ✭ 118 (-35.52%)
JlscaSide-channel toolkit in Julia
Stars: ✭ 114 (-37.7%)
Adversarial Robustness ToolboxAdversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Stars: ✭ 2,638 (+1341.53%)
KillchainA unified console to perform the "kill chain" stages of attacks.
Stars: ✭ 172 (-6.01%)
InstahackBest Tool For instagram bruteforce hacking Tool By EvilDevil
Stars: ✭ 139 (-24.04%)
NailgunNailgun attack on ARM devices.
Stars: ✭ 114 (-37.7%)
Cc AttackUsing Socks4/5 proxy to make a multithreading Http-flood/Https-flood (cc) attack.
Stars: ✭ 145 (-20.77%)
BrutemapLet's find someone's account
Stars: ✭ 113 (-38.25%)
Misp MaltegoSet of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Stars: ✭ 112 (-38.8%)
DiffaiA certifiable defense against adversarial examples by training neural networks to be provably robust
Stars: ✭ 171 (-6.56%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+5546.45%)
3d Bin Container PackingA variant of the Largest Area Fit First (LAFF) algorithm + brute force algorithm
Stars: ✭ 145 (-20.77%)