MrMugiwara / against-crackerLinks
against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list.
☆20Updated 9 years ago
Alternatives and similar repositories for against-cracker
Users that are interested in against-cracker are comparing it to the libraries listed below
Sorting:
- Password cracking utility☆53Updated 4 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 12 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 11 months ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 7 years ago
- CTF Writeups☆17Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Updated 10 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- Capstone: Keylogger Trojan☆35Updated 7 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆29Updated 5 years ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Updated 6 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Wi-Fi Backdoors☆39Updated 10 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Graphical user interface for the windows version of THC Hydra☆55Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆17Updated 8 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- My metasploit modules☆11Updated 10 years ago
- 📡 A security research tool with shodan integration☆25Updated 7 years ago