RomBuster is a router exploitation tool that allows to disclosure network router admin password.
☆538Jul 18, 2024Updated last year
Alternatives and similar repositories for RomBuster
Users that are interested in RomBuster are comparing it to the libraries listed below
Sorting:
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆238Jul 17, 2024Updated last year
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆214Jul 22, 2024Updated last year
- CamOver is a camera exploitation tool that allows to disclosure network camera admin password.☆576Jul 17, 2024Updated last year
- Modular penetration testing platform that enables you to write, test, and execute exploit code.☆320Dec 1, 2024Updated last year
- Ideaslocas Repository☆37May 24, 2021Updated 4 years ago
- vMass Bot Vulnerability Scanner & Auto Exploiter Tool Written in Perl.☆210Jun 5, 2023Updated 2 years ago
- Wi-Fi Exploitation Framework☆2,766Sep 24, 2025Updated 5 months ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming languag…☆49Oct 13, 2024Updated last year
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,285Nov 1, 2025Updated 4 months ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- TIGMINT: OSINT (Open Source Intelligence) GUI software framework☆245Jul 29, 2021Updated 4 years ago
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.☆1,048Jan 15, 2026Updated last month
- PowerShell Asynchronous TCP Reverse Shell☆158Nov 27, 2025Updated 3 months ago
- Simple rapper for Mimikatz, bypass Defender☆137Sep 26, 2021Updated 4 years ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆156Mar 31, 2024Updated last year
- ☆12Sep 22, 2022Updated 3 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆245Aug 14, 2024Updated last year
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Jul 6, 2024Updated last year
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆144Feb 19, 2026Updated last week
- Search and extract blob files on the Ethereum Blockchain network☆44Apr 3, 2021Updated 4 years ago
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆244Jul 3, 2024Updated last year
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆156Apr 27, 2021Updated 4 years ago
- This tool gives information about the phone number that you entered.☆1,936Jul 13, 2024Updated last year
- The Shadow Attack Framework☆1,116Sep 4, 2022Updated 3 years ago
- Maryam: Open-source Intelligence(OSINT) Framework☆1,199Sep 19, 2024Updated last year
- Pentesting automation platform that combines hacking tools to complete assessments☆520Updated this week
- CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit☆823Oct 11, 2023Updated 2 years ago
- Automated Red Team Infrastructure deployement using Docker☆1,261Aug 24, 2022Updated 3 years ago
- Quick OSINT checks for IPs and Domains during triage and investigations.☆31Jun 26, 2024Updated last year
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆228Sep 24, 2021Updated 4 years ago
- ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication☆1,024Mar 13, 2023Updated 2 years ago
- ☆17Jul 18, 2020Updated 5 years ago
- D3Ext's Forward Shell☆120Oct 15, 2023Updated 2 years ago
- Network Analysis Tool☆3,332Apr 10, 2023Updated 2 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year