Protocol agnostic online password guessing API.
☆85Mar 8, 2023Updated 3 years ago
Alternatives and similar repositories for BruteLoops
Users that are interested in BruteLoops are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆34Jul 6, 2024Updated last year
- How to ARM Yourself - Bsides Tampa 2020☆14Mar 1, 2020Updated 6 years ago
- It's a quick HTTPS server.☆14Oct 7, 2022Updated 3 years ago
- LinkedIn reconnaissance tool☆54Dec 17, 2021Updated 4 years ago
- Simple parser framework.☆25Jun 21, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- ☆56May 13, 2020Updated 5 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation☆2,241Apr 3, 2023Updated 3 years ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆67Jul 10, 2024Updated last year
- ☆13Apr 8, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,089Mar 19, 2024Updated 2 years ago
- Collection of CobaltStrike beacon object files☆105Feb 14, 2022Updated 4 years ago
- Exploit for HiveNightmare - CVE-2021–36934☆61Aug 22, 2025Updated 8 months ago
- C# implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs☆150Oct 25, 2021Updated 4 years ago
- This repo is dedicated to a powerpoint exploit☆33Dec 11, 2020Updated 5 years ago
- Bloodhound Reporting for Blue and Purple Teams☆1,292Nov 15, 2025Updated 5 months ago
- Generate Mimikatz Golden Ticket commands with ease!☆53Dec 4, 2020Updated 5 years ago
- ☆40Jul 29, 2021Updated 4 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆151Feb 10, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,598Feb 5, 2026Updated 3 months ago
- WMI SA stuffs☆30Apr 18, 2022Updated 4 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆639Jan 31, 2023Updated 3 years ago
- RedTeam network tool based on OrangePi R1☆24Jan 27, 2025Updated last year
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆443Aug 18, 2023Updated 2 years ago
- ☆110May 14, 2018Updated 7 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,566Oct 17, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆508Sep 23, 2025Updated 7 months ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆123Nov 2, 2019Updated 6 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 11 months ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Oct 29, 2021Updated 4 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 3 years ago
- Get your APT on using social media as a tool for data exfiltration.☆150Dec 8, 2022Updated 3 years ago