Xyl2k / Hydra-GUILinks
Graphical user interface for the windows version of THC Hydra
☆53Updated 7 years ago
Alternatives and similar repositories for Hydra-GUI
Users that are interested in Hydra-GUI are comparing it to the libraries listed below
Sorting:
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 4 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆37Updated 5 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- Mutation Of Vıruses☆49Updated 9 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆23Updated 7 years ago
- SkyRAT - Powershell Remote Administration Tool☆33Updated 7 years ago
- A simple Android Remote Administration Tool written for https://0x00sec.org!☆36Updated 9 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible…☆20Updated 9 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆29Updated 6 years ago
- Better Remote Access Trojan☆50Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 8 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 9 years ago
- My public exploit collection.