Cerbrutus-BruteForcer / cerbrutus
Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force market).
☆368Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for cerbrutus
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆506Updated 9 months ago
- Turn PuTTY into an SSH login bruteforcing tool.☆283Updated 4 years ago
- Multi-threaded Python Port Scanner with Nmap Integration☆354Updated 2 years ago
- Script for generating revshells☆454Updated 2 months ago
- Collection of reverse shells for red team operations.☆466Updated last month
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆694Updated 3 months ago
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆515Updated 9 months ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆464Updated 3 months ago
- fully automated pentesting tool☆504Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆148Updated last week
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆361Updated 2 years ago
- Generates millions of keyword-based password mutations in seconds.☆1,169Updated 3 months ago
- Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert En…☆481Updated 5 months ago
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆247Updated 2 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆552Updated 3 years ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆396Updated 10 months ago
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential A…☆464Updated last year
- Work in progress...☆453Updated 2 months ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆285Updated 3 years ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,023Updated 4 months ago
- PHP shells that work on Linux OS, macOS, and Windows OS.☆459Updated last year
- Short checklists for penetration testing methodology☆187Updated last year
- Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.☆552Updated 2 months ago
- Zero Infrastructure Password Cracking☆394Updated 3 months ago
- ☆209Updated 4 years ago
- All in one tool to make your hacking easier.☆190Updated 2 years ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆274Updated 2 years ago
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆427Updated 4 years ago