arcaneiceman / krakenLinks
Kraken: A multi-platform distributed brute-force password cracking system
☆317Updated 2 years ago
Alternatives and similar repositories for kraken
Users that are interested in kraken are comparing it to the libraries listed below
Sorting:
- Automated rogue access point setup tool.☆196Updated 4 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆366Updated last year
- Turn PuTTY into an SSH login bruteforcing tool.☆284Updated 4 years ago
- Zero Infrastructure Password Cracking☆406Updated 9 months ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆222Updated 10 months ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆235Updated 9 months ago
- Automated WPA/WPA2 PSK attack tool.☆573Updated 3 years ago
- Fast Modular Web Interfaces Bruteforcer☆225Updated 3 years ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆390Updated 3 years ago
- Update Version 3.1 added free SMS messaging.☆482Updated 3 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆369Updated 2 years ago
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆187Updated 2 years ago
- Network, recon and offensive-security tool for Linux.☆303Updated last year
- RomBuster is a router exploitation tool that allows to disclosure network router admin password.☆508Updated 10 months ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- Hide your payload into .jpg file☆394Updated 3 years ago
- A web front-end for password cracking and analytics☆379Updated last month
- C2 Powershell Command & Control Framework with BuiltIn Commands☆497Updated last year
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆206Updated 10 months ago
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities☆311Updated 10 months ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆401Updated last year
- Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a…☆435Updated 4 months ago
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆474Updated 5 months ago
- Automated brute-forcing attack tool.☆406Updated 4 years ago
- Password lists with top passwords to optimize bruteforce attacks☆361Updated last year
- NekoBot | Auto Exploiter With 500+ Exploit 2000+ Shell☆370Updated 4 years ago
- ☆413Updated 2 years ago
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆253Updated 3 years ago
- Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.☆393Updated last year
- Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any fir…☆359Updated 4 years ago