Cerbrutus-BruteForcer / cerbrutus
Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force market).
☆368Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for cerbrutus
- Collection of reverse shells for red team operations.☆462Updated last month
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆504Updated 9 months ago
- Script for generating revshells☆453Updated 2 months ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆462Updated 2 months ago
- For pentesters who don't wanna leave their terminals.☆183Updated 3 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆694Updated 2 months ago
- Generates millions of keyword-based password mutations in seconds.☆1,143Updated 3 months ago
- Turn PuTTY into an SSH login bruteforcing tool.☆282Updated 3 years ago
- Pentesting automation platform that combines hacking tools to complete assessments☆436Updated this week
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆551Updated 3 years ago
- Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert En…☆479Updated 5 months ago
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆513Updated 9 months ago
- Work in progress...☆449Updated last month
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆285Updated 3 years ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆284Updated 10 months ago
- A Powerful Sensor Tool to discover login panels, and POST Form SQLi Scanning☆469Updated last year
- This Python script can be used to bypass IP source restrictions using HTTP headers.☆380Updated 6 months ago
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆247Updated 2 years ago
- Penelope Shell Handler☆684Updated 2 weeks ago
- fully automated pentesting tool☆503Updated last year
- ☆412Updated 2 months ago
- A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generati…☆288Updated 2 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆360Updated 2 years ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆249Updated last year
- MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilitie…☆859Updated 3 months ago
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆162Updated 11 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆148Updated this week
- PowerShell Ransomware Simulator with C2 Server☆463Updated 9 months ago