arcaneiceman / krakenLinks
Kraken: A multi-platform distributed brute-force password cracking system
☆324Updated 2 years ago
Alternatives and similar repositories for kraken
Users that are interested in kraken are comparing it to the libraries listed below
Sorting:
- Automated rogue access point setup tool.☆196Updated 4 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆230Updated last year
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆245Updated last year
- TorghostNG - Make all your internet traffic anonymized with Tor network. Rewritten from TorGhost with Python 3☆54Updated 5 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆371Updated last year
- Update Version 3.1 added free SMS messaging.☆491Updated 3 years ago
- Turn PuTTY into an SSH login bruteforcing tool.☆288Updated 4 years ago
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆210Updated last year
- Automated WPA/WPA2 PSK attack tool.☆583Updated 4 years ago
- SniperPhish - The Web-Email Spear Phishing Toolkit☆605Updated 4 months ago
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆194Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆115Updated 4 years ago
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆236Updated last year
- Password lists with top passwords to optimize bruteforce attacks☆381Updated last year
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆188Updated 4 months ago
- ☆413Updated 2 years ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆403Updated 2 weeks ago
- Fast Modular Web Interfaces Bruteforcer☆228Updated 3 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆375Updated 2 years ago
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆499Updated 9 months ago
- ☆159Updated 2 years ago
- Network, recon and offensive-security tool for Linux.☆313Updated last year
- How to install Cain and Abel on Windows 10. Full download and installation process.Cain and able setup file☆29Updated 3 years ago
- Modular personalized dictionary generator.☆211Updated last year
- A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module.☆168Updated 2 years ago
- Find exploits in local and online database☆77Updated 11 months ago
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆254Updated 3 years ago
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆411Updated 2 years ago
- GUI Osint Framework with Kali Linux☆160Updated 2 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆264Updated 4 years ago