RomBuster is a router exploitation tool that allows to disclosure network router admin password.
☆549Jul 18, 2024Updated last year
Alternatives and similar repositories for RomBuster
Users that are interested in RomBuster are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆244Jul 17, 2024Updated last year
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆216Jul 22, 2024Updated last year
- CamOver is a camera exploitation tool that allows to disclosure network camera admin password.☆587Jul 17, 2024Updated last year
- Modular penetration testing platform that enables you to write, test, and execute exploit code.☆324Apr 2, 2026Updated last month
- Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming languag…☆49Apr 2, 2026Updated last month
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Ideaslocas Repository☆37May 24, 2021Updated 4 years ago
- ☆28Sep 10, 2022Updated 3 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,325Nov 1, 2025Updated 6 months ago
- Wi-Fi Exploitation Framework☆2,776Sep 24, 2025Updated 7 months ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆157Mar 31, 2024Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆97Jul 26, 2021Updated 4 years ago
- vMass Bot Vulnerability Scanner & Auto Exploiter Tool Written in Perl.☆212Jun 5, 2023Updated 2 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆190Jan 30, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12Sep 22, 2022Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- PowerShell Asynchronous TCP Reverse Shell☆156Nov 27, 2025Updated 5 months ago
- TIGMINT: OSINT (Open Source Intelligence) GUI software framework☆256Jul 29, 2021Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.☆1,055Apr 15, 2026Updated 2 weeks ago
- Search and extract blob files on the Ethereum Blockchain network☆44Apr 3, 2021Updated 5 years ago
- Routopsy - Hacking Routers with Routers☆179Jul 30, 2021Updated 4 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆247Aug 14, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆228Sep 24, 2021Updated 4 years ago
- Exploitation Framework for Embedded Devices☆13,097Mar 2, 2026Updated 2 months ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Mar 17, 2026Updated last month
- fully automated pentesting tool☆517Dec 8, 2022Updated 3 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆156Apr 27, 2021Updated 5 years ago
- PENIOT: Penetration Testing Tool for IoT☆233Feb 22, 2022Updated 4 years ago
- Network Analysis Tool☆3,353Apr 10, 2023Updated 3 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- This tool gives information about the phone number that you entered.☆1,976Jul 13, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The Shadow Attack Framework☆1,117Sep 4, 2022Updated 3 years ago
- CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit☆824Oct 11, 2023Updated 2 years ago
- ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication☆1,023Mar 13, 2023Updated 3 years ago
- A polyglot payload generator☆244Aug 15, 2022Updated 3 years ago
- Wi-Fi sploit is a password cracker for router's login pages (but it works fine in any login page site, even on internet :D)☆119Aug 8, 2024Updated last year
- Automated WPA/WPA2 PSK attack tool.☆637Aug 21, 2021Updated 4 years ago
- HatAsm is a powerful assembler and disassembler that provides support for all common architectures.☆18Jan 5, 2026Updated 4 months ago