Cerbrutus-BruteForcer / cerbrutus
Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force market).
☆386Updated 3 years ago
Alternatives and similar repositories for cerbrutus
Users that are interested in cerbrutus are comparing it to the libraries listed below
Sorting:
- Script for generating revshells☆469Updated 8 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆524Updated last year
- Generates millions of keyword-based password mutations in seconds.☆1,302Updated 9 months ago
- Collection of reverse shells for red team operations.☆492Updated last month
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 3 years ago
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆392Updated 3 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated last week
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆534Updated last year
- Pentesting automation platform that combines hacking tools to complete assessments☆461Updated last week
- XSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.☆314Updated 2 years ago
- A Powerful Sensor Tool to discover login panels, and POST Form SQLi Scanning☆489Updated last year
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆295Updated last year
- Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert En…☆507Updated 11 months ago
- Multi-threaded Python Port Scanner with Nmap Integration☆365Updated 2 years ago
- Shodan Dorks☆468Updated 2 years ago
- Turn PuTTY into an SSH login bruteforcing tool.☆284Updated 4 years ago
- An XSS Exploitation Tool☆317Updated last month
- Redeye is a tool intended to help you manage your data during a pentest operation☆465Updated 8 months ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,125Updated 9 months ago
- Simple HTTP listener for security testing☆113Updated 5 months ago
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆472Updated 4 years ago
- fully automated pentesting tool☆509Updated 2 years ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆571Updated 6 months ago
- MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilitie…☆969Updated 9 months ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆713Updated 3 months ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆371Updated 2 years ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆852Updated last month
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆399Updated last year
- Real-world infosec wordlists, updated regularly☆1,497Updated this week
- ☆122Updated last year