Cerbrutus-BruteForcer / cerbrutusLinks
Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force market).
☆393Updated 3 years ago
Alternatives and similar repositories for cerbrutus
Users that are interested in cerbrutus are comparing it to the libraries listed below
Sorting:
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆531Updated last year
- Script for generating revshells☆476Updated 10 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆159Updated this week
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆274Updated 5 months ago
- Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert En…☆520Updated last year
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆400Updated 6 months ago
- For pentesters who don't wanna leave their terminals.☆183Updated 3 years ago
- Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.☆564Updated last month
- Collection of reverse shells for red team operations.☆508Updated 4 months ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆404Updated last year
- Simple HTTP listener for security testing☆116Updated 8 months ago
- Pentesting automation platform that combines hacking tools to complete assessments☆497Updated this week
- Work in progress...☆499Updated 10 months ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆468Updated 11 months ago
- Turn PuTTY into an SSH login bruteforcing tool.☆285Updated 4 years ago
- A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generati…☆293Updated 3 years ago
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆254Updated 3 years ago
- XSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.☆315Updated 3 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆716Updated 6 months ago
- fully automated pentesting tool☆514Updated 2 years ago
- Network, recon and offensive-security tool for Linux.☆305Updated last year
- Tool to find CVEs and Exploits.☆482Updated last year
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆536Updated last year
- Remote persistent 🔑Logger for Windows and Linux☆298Updated 2 years ago
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential A…☆478Updated 3 months ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 4 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆372Updated 2 years ago
- Google Dork File Finder☆197Updated 7 months ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆94Updated last year
- Generates millions of keyword-based password mutations in seconds.☆1,332Updated 2 months ago