Ninjutsu-blog / NinjutsuLinks
☆60Updated 4 years ago
Alternatives and similar repositories for Ninjutsu
Users that are interested in Ninjutsu are comparing it to the libraries listed below
Sorting:
- XposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of…☆147Updated 6 years ago
- Installing Kali linux on Vps Server☆117Updated 6 years ago
- An exploit for SHAREit <= v 4.0.38☆56Updated 6 years ago
- Exploit Pack - Project☆72Updated 6 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Updated 6 years ago
- Automated Pentest Tools Designed For Parrot Linux☆84Updated 6 years ago
- The Metasploit GUI☆93Updated 9 years ago
- Official repository for the Shodan.io mobile Application☆176Updated 2 years ago
- We Use Github Extensively and openly. So it becomes dificult to track what's what and what's where. This repository is a master repo to H…☆138Updated 2 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Updated 6 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆123Updated 6 years ago
- Python script to crack hashes using online services☆89Updated 4 years ago
- An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)☆64Updated 3 years ago
- Tweaks to run Kali Linux desktop panels and gui apps on Windows 10☆128Updated 3 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆211Updated 6 years ago
- Autosploit = Automating Metasploit Modules.☆77Updated 6 years ago
- ☆41Updated 12 years ago
- Hash Generator & Cracker☆38Updated 5 years ago
- Operational Security utility and automator.☆141Updated 5 years ago
- A graphical user interface for the medusa brute forcing utility. http://wiki.taksmind.com//index.php?title=Medusa-gui☆40Updated 8 years ago
- Run Kali tools on all distributions. Offline search, including in package descriptions.☆109Updated 7 years ago
- phishing reporting tool☆14Updated 7 years ago
- Red Login: SSH Brute-force Tools☆106Updated 7 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆55Updated 7 years ago
- OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).☆154Updated 6 years ago
- ES File Explorer Open Port Vulnerability - CVE-2019-6447☆673Updated 2 years ago
- wordpress hash cracker .☆66Updated 4 years ago
- A tool for recover router password☆33Updated 7 years ago
- Hashcat wrapper to help automate the cracking process☆117Updated 7 years ago
- mikrot8over: Fast exploitation tool for Mikrotik RouterOS up to 6.38.4☆112Updated 5 years ago