Cerbrutus-BruteForcer / cerbrutusLinks
Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force market).
☆395Updated 4 years ago
Alternatives and similar repositories for cerbrutus
Users that are interested in cerbrutus are comparing it to the libraries listed below
Sorting:
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆532Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆161Updated last week
- Script for generating revshells☆476Updated 11 months ago
- For pentesters who don't wanna leave their terminals.☆183Updated 4 years ago
- Collection of reverse shells for red team operations.☆511Updated 5 months ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆467Updated last year
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆275Updated 5 months ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆404Updated last year
- Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.☆565Updated 2 months ago
- Zero Infrastructure Password Cracking☆409Updated last year
- A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generati…☆293Updated 3 years ago
- XSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.☆316Updated 3 years ago
- Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert En…☆524Updated last year
- Turn PuTTY into an SSH login bruteforcing tool.☆285Updated 4 years ago
- Modular personalized dictionary generator.☆208Updated last year
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆401Updated 7 months ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆728Updated 2 weeks ago
- fully automated pentesting tool☆514Updated 2 years ago
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆254Updated 3 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆375Updated 2 years ago
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential A…☆478Updated 3 months ago
- Python3 o365 User Enumeration Tool☆550Updated 7 months ago
- Google Dork File Finder☆196Updated 7 months ago
- Short checklists for penetration testing methodology☆194Updated last year
- Various wordlists FR & EN - Cracking French passwords☆290Updated this week
- Work in progress...☆501Updated 11 months ago
- A Zphisher GUI Back-Office Plugin☆225Updated last year
- Simple HTTP listener for security testing☆116Updated 9 months ago
- Extract Windows Wi-Fi Passwords to Remote URL☆267Updated 3 years ago
- Pentesting automation platform that combines hacking tools to complete assessments☆508Updated last week