Red Login: SSH Brute-force Tools
☆106Jun 28, 2018Updated 7 years ago
Alternatives and similar repositories for RedLogin
Users that are interested in RedLogin are comparing it to the libraries listed below
Sorting:
- Plog - A simple and powerful keylogger !☆11Jun 28, 2018Updated 7 years ago
- BitPing A Simple Bitcoin Address Changer From Clipboard☆11Jun 28, 2018Updated 7 years ago
- Multithreaded ssh scan tool for networks☆20Oct 30, 2022Updated 3 years ago
- Advanced Hash Manipulation☆176Oct 14, 2019Updated 6 years ago
- Telegram Flooder☆13Jun 28, 2018Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆60Nov 19, 2017Updated 8 years ago
- Shellcode Encrypter & Decrypter via XOR Cipher☆61Aug 29, 2019Updated 6 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- Powershell script to setup windows port forwarding using native netsh client☆124Aug 6, 2018Updated 7 years ago
- Hacking is your weapon :)☆53Jan 16, 2020Updated 6 years ago
- ☆23Feb 9, 2018Updated 8 years ago
- ☆66Feb 10, 2018Updated 8 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Nov 30, 2017Updated 8 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- TeleShadow - Telegram Desktop Session Stealer (Windows)☆118Jun 28, 2018Updated 7 years ago
- BotNet Scanner For Educational Purposes.☆19Mar 7, 2020Updated 6 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Source Code of Jigsaw Ransomware Created in Vb.Net☆20Mar 16, 2018Updated 8 years ago
- Disabling Windows Defender & downloading payload☆21Jul 28, 2020Updated 5 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆221Jun 19, 2024Updated last year
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- NetCat implementation using the new Apple Network framework, C# port of the C sample☆12Aug 27, 2018Updated 7 years ago
- The fastest (and least featureful) DNS bruteforcer in the South☆27Dec 31, 2019Updated 6 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- This tool helps you pentest THE PAST of a website.☆15Jul 13, 2025Updated 8 months ago
- Detect alive host and open port .☆17Dec 7, 2022Updated 3 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Nov 27, 2018Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Apr 9, 2019Updated 6 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Remote Administration Tool For Windows VB.NET☆12Mar 19, 2019Updated 7 years ago
- A permutation generation tool written in golang☆210Jul 15, 2019Updated 6 years ago