Know the dangers of credential reuse attacks.
☆2,102Dec 9, 2025Updated 4 months ago
Alternatives and similar repositories for Cr3dOv3r
Users that are interested in Cr3dOv3r are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,458Nov 3, 2018Updated 7 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,766Dec 9, 2025Updated 4 months ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆551Oct 14, 2024Updated last year
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Hacking systems with the automation of PasteJacking attacks.☆400Oct 14, 2024Updated last year
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,271Nov 20, 2025Updated 4 months ago
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,193Oct 24, 2018Updated 7 years ago
- Remote Recon and Collection