EntySec / ShrederLinks
Shreder is a powerful multi-threaded SSH protocol password brute-force tool.
☆212Updated last year
Alternatives and similar repositories for Shreder
Users that are interested in Shreder are comparing it to the libraries listed below
Sorting:
- Fast Modular Web Interfaces Bruteforcer☆228Updated 4 years ago
- A tool for generating reverse shell payloads on the fly.☆144Updated 3 years ago
- Yet another content discovery tool☆120Updated last year
- A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module.☆169Updated 3 years ago
- D3Ext's Forward Shell☆120Updated 2 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆232Updated last year
- An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to he…☆228Updated 3 years ago
- An XSS Exploitation Tool☆325Updated 4 months ago
- A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public☆63Updated 4 years ago
- WpCrack is an audit and brute force tool used to remotely test WordPress blogging software☆106Updated 2 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆121Updated 3 years ago
- It's a simple tool for test vulnerability shellshock☆117Updated 4 years ago
- Turn PuTTY into an SSH login bruteforcing tool.☆288Updated 4 years ago
- This Python script can be used to bypass IP source restrictions using HTTP headers.☆396Updated 2 months ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 3 years ago
- 🦁 Python project to identify and scan for vulnerabilities related to the Joomla CMS project. It scans for common misconfigurations and p…☆172Updated last year
- Exploits project Hacking Command Center☆50Updated 2 years ago
- Python Obfuscator to generate One-Liners and FUD Payloads.☆163Updated 4 years ago
- pFuzz helps us to bypass web application firewall by using different methods at the same time.☆161Updated 4 years ago
- ☆133Updated 2 years ago
- Assist reverse tcp shells in post-exploration tasks☆221Updated last month
- Multiplatform Python WebShell☆318Updated last year
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆121Updated last year
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆69Updated 2 years ago
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆226Updated 4 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆377Updated 3 years ago
- https://medium.com/@mansoorr/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8☆58Updated 5 years ago
- NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473☆164Updated 4 years ago
- Huge Collection of Wordpress Exploits and CVES☆124Updated 2 years ago
- [EN] BETA: Layla - recon tool for bug bounty☆76Updated 3 years ago