Red Login: SSH Brute-force Tools
☆106Jun 28, 2018Updated 7 years ago
Alternatives and similar repositories for RedLogin
Users that are interested in RedLogin are comparing it to the libraries listed below
Sorting:
- Advanced Hash Manipulation☆175Oct 14, 2019Updated 6 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- BitPing A Simple Bitcoin Address Changer From Clipboard☆11Jun 28, 2018Updated 7 years ago
- ☆66Feb 10, 2018Updated 8 years ago
- Plog - A simple and powerful keylogger !☆11Jun 28, 2018Updated 7 years ago
- Powershell script to setup windows port forwarding using native netsh client☆124Aug 6, 2018Updated 7 years ago
- ☆23Feb 9, 2018Updated 8 years ago
- Shellcode Encrypter & Decrypter via XOR Cipher☆61Aug 29, 2019Updated 6 years ago
- Telegram Flooder☆13Jun 28, 2018Updated 7 years ago
- This tool helps you pentest THE PAST of a website.☆15Jul 13, 2025Updated 7 months ago
- Hacking is your weapon :)☆53Jan 16, 2020Updated 6 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Nov 30, 2017Updated 8 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Some sample code from my Zero Nights 2017 presentation.☆60Nov 19, 2017Updated 8 years ago
- TeleShadow - Telegram Desktop Session Stealer (Windows)☆116Jun 28, 2018Updated 7 years ago
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- The fastest (and least featureful) DNS bruteforcer in the South☆27Dec 31, 2019Updated 6 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- Crack legacy zip files using plaintext, bruteforce or dictionary attacks.☆50Jan 23, 2025Updated last year
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- Multithreaded ssh scan tool for networks☆20Oct 30, 2022Updated 3 years ago
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆221Jun 19, 2024Updated last year
- Deploy payloads to *Nix systems en masse☆108Apr 24, 2020Updated 5 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- ZWSP-Tool is a powerful toolkit that allows to manipulate zero width spaces quickly and easily. ZWSP-Tool allows in particular to detect,…☆24Jul 29, 2020Updated 5 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 2 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Apr 9, 2019Updated 6 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆125May 25, 2018Updated 7 years ago
- Office for Mac Macro Payload Generator☆244Sep 25, 2025Updated 5 months ago
- VBA Reversed TCP Meterpreter Stager☆65Apr 23, 2018Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- Centralized Firewall Control☆21Feb 5, 2018Updated 8 years ago
- A permutation generation tool written in golang☆209Jul 15, 2019Updated 6 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆52Feb 28, 2017Updated 9 years ago