MichaelDim02 / NarthexLinks
Modular personalized dictionary generator.
☆213Updated last year
Alternatives and similar repositories for Narthex
Users that are interested in Narthex are comparing it to the libraries listed below
Sorting:
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 3 years ago
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆213Updated last year
- A WLAN red team framework.☆155Updated last year
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆401Updated 4 years ago
- A tool for generating reverse shell payloads on the fly.☆144Updated 3 years ago
- DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets☆242Updated 4 years ago
- Fast Modular Web Interfaces Bruteforcer☆228Updated 4 years ago
- For pentesters who don't wanna leave their terminals.☆184Updated 4 years ago
- Yet another content discovery tool☆120Updated last year
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆110Updated 11 months ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆246Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Updated 3 months ago
- An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to he…☆228Updated 3 years ago
- A polyglot payload generator☆244Updated 3 years ago
- Network, recon and offensive-security tool for Linux.☆315Updated last year
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆257Updated 3 years ago
- ☆160Updated 2 years ago
- [EN] BETA: Layla - recon tool for bug bounty☆76Updated 3 years ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆110Updated 2 years ago
- Wordlists handcrafted (and automated) with ♥☆222Updated 3 months ago
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆417Updated 2 years ago
- Turn PuTTY into an SSH login bruteforcing tool.☆288Updated 5 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆121Updated last year
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- Automated rogue access point setup tool.☆200Updated 4 years ago
- Zero Infrastructure Password Cracking☆411Updated last year
- An Encrypted File transfer via AES-256-CBC☆52Updated 4 years ago
- Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack and/or Telegram.☆256Updated 5 months ago
- OSINT tool to get information from a Github and Gitlab profile and find user's email addresses leaked on commits.