Cerbrutus-BruteForcer / cerbrutusLinks
Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force market).
☆394Updated 3 years ago
Alternatives and similar repositories for cerbrutus
Users that are interested in cerbrutus are comparing it to the libraries listed below
Sorting:
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆529Updated last year
- Script for generating revshells☆473Updated 10 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated this week
- Turn PuTTY into an SSH login bruteforcing tool.☆285Updated 4 years ago
- Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.☆565Updated 3 weeks ago
- For pentesters who don't wanna leave their terminals.☆183Updated 3 years ago
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆399Updated 5 months ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆275Updated 4 months ago
- Collection of reverse shells for red team operations.☆502Updated 4 months ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆467Updated 10 months ago
- Pentesting automation platform that combines hacking tools to complete assessments☆470Updated last week
- fully automated pentesting tool☆512Updated 2 years ago
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆536Updated last year
- Generates millions of keyword-based password mutations in seconds.☆1,332Updated last month
- Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert En…☆517Updated last year
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆254Updated 3 years ago
- XSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.☆315Updated 3 years ago
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆401Updated 2 years ago
- Modular personalized dictionary generator.☆209Updated 11 months ago
- A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generati…☆292Updated 3 years ago
- A Powerful Sensor Tool to discover login panels, and POST Form SQLi Scanning☆492Updated 2 years ago
- Work in progress...☆496Updated 9 months ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆714Updated 5 months ago
- Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack and/or Telegram.☆248Updated last month
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆490Updated 5 years ago
- Extract Windows Wi-Fi Passwords to Remote URL☆263Updated 2 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 4 years ago
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆191Updated 2 years ago
- A Zphisher GUI Back-Office Plugin☆218Updated last year
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆194Updated last year