arcaneiceman / krakenLinks
Kraken: A multi-platform distributed brute-force password cracking system
☆327Updated 2 years ago
Alternatives and similar repositories for kraken
Users that are interested in kraken are comparing it to the libraries listed below
Sorting:
- Automated rogue access point setup tool.☆201Updated 4 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆238Updated last year
- CrackerJack / Hashcat Web Interface / Context Information Security☆381Updated 2 years ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆415Updated 5 months ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆244Updated last year
- Fast Modular Web Interfaces Bruteforcer☆225Updated 4 years ago
- Turn PuTTY into an SSH login bruteforcing tool.☆290Updated 5 years ago
- Automated WPA/WPA2 PSK attack tool.☆623Updated 4 years ago
- Update Version 3.1 added free SMS messaging.☆499Updated 4 years ago
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆214Updated last year
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆193Updated 2 years ago
- ☆413Updated 2 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆121Updated 2 years ago
- Modular personalized dictionary generator.☆212Updated last year
- SniperPhish - The Web-Email Spear Phishing Toolkit☆623Updated 9 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆122Updated 5 years ago
- Password lists with top passwords to optimize bruteforce attacks☆396Updated last year
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆520Updated last year
- TorghostNG - Make all your internet traffic anonymized with Tor network. Rewritten from TorGhost with Python 3☆57Updated 5 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆376Updated 3 years ago
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆419Updated 3 years ago
- Attack Surface Discovery tool built on a microservice approach, utilizing multi-threading for fast, internet-scale asset indexing☆255Updated 2 months ago
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆240Updated last year
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆414Updated 4 years ago
- Fork from @rsmudge/armitage☆140Updated 3 years ago
- GUI Osint Framework with Kali Linux☆171Updated 2 years ago
- Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any fir…☆382Updated 5 years ago
- Network, recon and offensive-security tool for Linux.☆317Updated last year
- A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module.☆169Updated last month
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 4 years ago