bruteforce authentication web forms (google chrome extension)
☆57Aug 10, 2021Updated 4 years ago
Alternatives and similar repositories for www_brute
Users that are interested in www_brute are comparing it to the libraries listed below
Sorting:
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- You can get cc from hear coded by cyber kallan☆19Nov 7, 2019Updated 6 years ago
- ☆17Mar 21, 2019Updated 6 years ago
- AhMyth is an popular open source android rat. But the official AhMyth contains many bugs. For an example, you can't fetch victim's files …☆23Jan 30, 2021Updated 5 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Mar 5, 2023Updated 3 years ago
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆24May 30, 2018Updated 7 years ago
- Bleichenbachers "Million message attack" on RSA in Python☆30Apr 5, 2021Updated 4 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- ☆27Sep 22, 2021Updated 4 years ago
- ☆13Jun 10, 2022Updated 3 years ago
- Generate image payloads in JS to bypass filters☆39Mar 16, 2021Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- SnapCrack is an Android application and web UI that is capable of crack detection and localization in real time. SnapCrack leverages basi…☆10Mar 4, 2023Updated 3 years ago
- ☆14Feb 19, 2023Updated 3 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Metasploit Framework☆10Apr 3, 2017Updated 8 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- ☆11Nov 29, 2018Updated 7 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆18Mar 30, 2021Updated 4 years ago
- Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY☆10Feb 19, 2023Updated 3 years ago
- ☆10Mar 6, 2023Updated 3 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- ☆12Jul 4, 2024Updated last year
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Nov 10, 2025Updated 3 months ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- ☆10Dec 5, 2023Updated 2 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- ☆10Mar 11, 2024Updated last year
- exfiltration/infiltration toolkit☆50Oct 31, 2024Updated last year
- ☆10Oct 6, 2020Updated 5 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- A speed-reading bookmarklet using rapid serial visual presentation.☆11Jul 16, 2016Updated 9 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- An extension that adds code snippets to Visual Studio Code☆13Mar 4, 2019Updated 7 years ago
- Examples of projects using Arduino and ESP8266☆13Oct 6, 2014Updated 11 years ago
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Jul 22, 2022Updated 3 years ago
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago