Cerbrutus-BruteForcer / cerbrutusView external linksLinks
Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force market).
☆415Aug 22, 2021Updated 4 years ago
Alternatives and similar repositories for cerbrutus
Users that are interested in cerbrutus are comparing it to the libraries listed below
Sorting:
- Remake of CVE-2020-9484 by Pentestical☆24Sep 16, 2024Updated last year
- Hide your payload in DNS☆617May 3, 2023Updated 2 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,790Jun 14, 2025Updated 8 months ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- Simple rapper for Mimikatz, bypass Defender☆137Sep 26, 2021Updated 4 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆292Jul 27, 2021Updated 4 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆59Apr 18, 2021Updated 4 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago
- Arkhota, a web brute forcer for Android.☆19Feb 15, 2023Updated 3 years ago
- Generate obfuscated meterpreter shells☆231Jun 12, 2021Updated 4 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆54Jan 25, 2022Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Sep 13, 2021Updated 4 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Aug 1, 2021Updated 4 years ago
- A simple multi-threaded distributed SSH brute-forcing tool written in Python☆462Oct 30, 2022Updated 3 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- Run Powershell without software restrictions.☆281Sep 8, 2021Updated 4 years ago
- Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...☆93Aug 31, 2022Updated 3 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆17Oct 27, 2019Updated 6 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,152Updated this week
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,463Mar 27, 2025Updated 10 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,867Aug 18, 2023Updated 2 years ago
- A small reverse shell for Linux & Windows☆625Jun 5, 2024Updated last year
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆119Jul 6, 2024Updated last year
- Open source pre-operation C2 server based on python and powershell☆761Jul 6, 2021Updated 4 years ago
- A C2 post-exploitation framework☆483Jan 24, 2024Updated 2 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆277Jan 14, 2023Updated 3 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆156Apr 27, 2021Updated 4 years ago
- 🤖 The Modern Port Scanner 🤖☆22Jul 1, 2021Updated 4 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Apr 19, 2021Updated 4 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- Bring your own print driver privilege escalation tool☆259Aug 5, 2021Updated 4 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆503May 16, 2023Updated 2 years ago
- Dangerously fast DNS/network/port scanner☆922Mar 18, 2022Updated 3 years ago
- A User Impersonation tool - via Token or Shellcode injection☆422May 21, 2022Updated 3 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,169Sep 29, 2021Updated 4 years ago