arcaneiceman / krakenLinks
Kraken: A multi-platform distributed brute-force password cracking system
☆318Updated 2 years ago
Alternatives and similar repositories for kraken
Users that are interested in kraken are comparing it to the libraries listed below
Sorting:
- Update Version 3.1 added free SMS messaging.☆483Updated 3 years ago
- Automated rogue access point setup tool.☆197Updated 4 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆227Updated last year
- CrackerJack / Hashcat Web Interface / Context Information Security☆367Updated last year
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆211Updated 11 months ago
- Turn PuTTY into an SSH login bruteforcing tool.☆285Updated 4 years ago
- Network, recon and offensive-security tool for Linux.☆303Updated last year
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆191Updated 2 years ago
- TorghostNG - Make all your internet traffic anonymized with Tor network. Rewritten from TorGhost with Python 3☆55Updated 5 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆237Updated 11 months ago
- ☆413Updated 2 years ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆403Updated last year
- Fast Modular Web Interfaces Bruteforcer☆227Updated 3 years ago
- Automated WPA/WPA2 PSK attack tool.☆577Updated 3 years ago
- RomBuster is a router exploitation tool that allows to disclosure network router admin password.☆515Updated last year
- SniperPhish - The Web-Email Spear Phishing Toolkit☆589Updated 2 months ago
- Password lists with top passwords to optimize bruteforce attacks☆370Updated last year
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆254Updated 3 years ago
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆482Updated 7 months ago
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆401Updated 2 years ago
- Python 3.x based email spoofer☆245Updated last year
- Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any fir…☆361Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆114Updated 4 years ago
- An open source batch script based WiFi Passview for Windows!☆317Updated last year
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆126Updated last month
- Learn how to set up a fake authentication web page on a fake WiFi network.☆111Updated 2 years ago
- Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3…☆305Updated 2 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆187Updated 2 months ago
- A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module.☆165Updated 2 years ago