RomBuster is a router exploitation tool that allows to disclosure network router admin password.
☆543Jul 18, 2024Updated last year
Alternatives and similar repositories for RomBuster
Users that are interested in RomBuster are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆244Jul 17, 2024Updated last year
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆214Jul 22, 2024Updated last year
- CamOver is a camera exploitation tool that allows to disclosure network camera admin password.☆585Jul 17, 2024Updated last year
- Modular penetration testing platform that enables you to write, test, and execute exploit code.☆323Apr 2, 2026Updated last week
- Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming languag…☆50Apr 2, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ideaslocas Repository☆37May 24, 2021Updated 4 years ago
- ☆28Sep 10, 2022Updated 3 years ago
- Wi-Fi Exploitation Framework☆2,773Sep 24, 2025Updated 6 months ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,315Nov 1, 2025Updated 5 months ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆156Mar 31, 2024Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆97Jul 26, 2021Updated 4 years ago
- vMass Bot Vulnerability Scanner & Auto Exploiter Tool Written in Perl.☆213Jun 5, 2023Updated 2 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆190Jan 30, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆12Sep 22, 2022Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- PowerShell Asynchronous TCP Reverse Shell☆158Nov 27, 2025Updated 4 months ago
- TIGMINT: OSINT (Open Source Intelligence) GUI software framework☆255Jul 29, 2021Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.☆1,054Apr 6, 2026Updated last week
- Search and extract blob files on the Ethereum Blockchain network☆44Apr 3, 2021Updated 5 years ago
- Routopsy - Hacking Routers with Routers☆179Jul 30, 2021Updated 4 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆246Aug 14, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆228Sep 24, 2021Updated 4 years ago
- Exploitation Framework for Embedded Devices☆13,066Mar 2, 2026Updated last month
- fully automated pentesting tool☆520Dec 8, 2022Updated 3 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Mar 17, 2026Updated 3 weeks ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆156Apr 27, 2021Updated 4 years ago
- PENIOT: Penetration Testing Tool for IoT☆231Feb 22, 2022Updated 4 years ago
- Network Analysis Tool☆3,345Apr 10, 2023Updated 3 years ago
- This tool gives information about the phone number that you entered.☆1,959Jul 13, 2024Updated last year
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The Shadow Attack Framework☆1,117Sep 4, 2022Updated 3 years ago
- Pwny is an implementation of an advanced payload written in pure C and designed for portability and extensibility.☆92Apr 2, 2026Updated last week
- CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit☆824Oct 11, 2023Updated 2 years ago
- ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication☆1,025Mar 13, 2023Updated 3 years ago
- Wi-Fi sploit is a password cracker for router's login pages (but it works fine in any login page site, even on internet :D)☆119Aug 8, 2024Updated last year
- A polyglot payload generator☆244Aug 15, 2022Updated 3 years ago
- Automated WPA/WPA2 PSK attack tool.☆632Aug 21, 2021Updated 4 years ago