arcaneiceman / kraken
Kraken: A multi-platform distributed brute-force password cracking system
☆316Updated last year
Alternatives and similar repositories for kraken:
Users that are interested in kraken are comparing it to the libraries listed below
- CrackerJack / Hashcat Web Interface / Context Information Security☆366Updated last year
- Automated rogue access point setup tool.☆195Updated 4 years ago
- Automated WPA/WPA2 PSK attack tool.☆566Updated 3 years ago
- Fast Modular Web Interfaces Bruteforcer☆224Updated 3 years ago
- Update Version 3.1 added free SMS messaging.☆479Updated 3 years ago
- Turn PuTTY into an SSH login bruteforcing tool.☆284Updated 4 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆219Updated 8 months ago
- SniperPhish - The Web-Email Spear Phishing Toolkit☆579Updated 11 months ago
- Framework RapidPayload - Metasploit Payload Generator | Crypter FUD AntiVirus Evasion☆414Updated 3 years ago
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆459Updated 3 months ago
- Hide your payload into .jpg file☆390Updated 3 years ago
- Zero Infrastructure Password Cracking☆403Updated 7 months ago
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆204Updated 8 months ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆227Updated 7 months ago
- Google dorking tool☆221Updated 6 months ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆492Updated last year
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆897Updated last year
- TorghostNG - Make all your internet traffic anonymized with Tor network. Rewritten from TorGhost with Python 3☆54Updated 4 years ago
- RomBuster is a router exploitation tool that allows to disclosure network router admin password.☆499Updated 8 months ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆384Updated 3 years ago
- Exploit Pack contains a full set of 39.000+ exploits, you can be sure that your next pentest will become unstoppable. All operating syste…☆89Updated 3 years ago
- ☆147Updated last year
- Remote persistent 🔑Logger for Windows and Linux☆300Updated last year
- ☆411Updated 2 years ago
- ☆132Updated 2 years ago
- Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3…☆302Updated 2 years ago
- Bluetooth hack, forked from https://gitlab.com/kalilinux/packages/bluesnarfer/☆226Updated last year
- A simple wordlists generator and mangler written in Python 3.10.1.☆123Updated last year
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆785Updated last year
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆399Updated last year