arcaneiceman / krakenLinks
Kraken: A multi-platform distributed brute-force password cracking system
☆316Updated 2 years ago
Alternatives and similar repositories for kraken
Users that are interested in kraken are comparing it to the libraries listed below
Sorting:
- Automated rogue access point setup tool.☆197Updated 4 years ago
- Update Version 3.1 added free SMS messaging.☆482Updated 3 years ago
- Fast Modular Web Interfaces Bruteforcer☆226Updated 3 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆367Updated last year
- Zero Infrastructure Password Cracking☆408Updated 10 months ago
- Red Team PowerShell Script☆334Updated last year
- Automated WPA/WPA2 PSK attack tool.☆576Updated 3 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆237Updated 10 months ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆225Updated 11 months ago
- SniperPhish - The Web-Email Spear Phishing Toolkit☆588Updated last month
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆187Updated last month
- C2 Powershell Command & Control Framework with BuiltIn Commands☆497Updated last year
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆370Updated 2 years ago
- ☆413Updated 2 years ago
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆209Updated 11 months ago
- Network, recon and offensive-security tool for Linux.☆303Updated last year
- The purpose of this tool is to test the window10 defender protection and also other antivirus protection.☆93Updated last year
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- Modular personalized dictionary generator.☆207Updated 10 months ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆110Updated 2 years ago
- Turn PuTTY into an SSH login bruteforcing tool.☆284Updated 4 years ago
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆477Updated 6 months ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆402Updated last year
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆189Updated 2 years ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆393Updated 3 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆296Updated 3 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆261Updated 4 years ago
- Automated brute-forcing attack tool.☆407Updated 4 years ago
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆904Updated last year
- Infect a pc with badusb and establish a connection through telegram.☆176Updated 2 years ago