MrMugiwara / against-crackerLinks
against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list.
☆21Updated 9 years ago
Alternatives and similar repositories for against-cracker
Users that are interested in against-cracker are comparing it to the libraries listed below
Sorting:
- Samsung TV Denial of Service (DoS) Attack☆36Updated 9 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Updated 8 years ago
- Password cracking utility☆54Updated 4 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 10 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Updated last year
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 12 years ago
- ☆91Updated 8 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Updated 8 years ago
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 9 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 10 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆37Updated 5 years ago
- Graphical user interface for the windows version of THC Hydra☆55Updated 8 years ago
- Capstone: Keylogger Trojan☆35Updated 7 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Wi-Fi Backdoors☆39Updated 10 years ago
- Post-Exploitation Framework☆77Updated 8 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Updated 9 years ago
- Black Nurse DOS attack☆71Updated 8 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆37Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 10 years ago
- Multi source CVE/exploit parser.☆27Updated 8 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Social Engineering Toys☆36Updated 9 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago