arcaneiceman / kraken
Kraken: A multi-platform distributed brute-force password cracking system
☆316Updated last year
Alternatives and similar repositories for kraken
Users that are interested in kraken are comparing it to the libraries listed below
Sorting:
- Automated rogue access point setup tool.☆196Updated 4 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆366Updated last year
- Automated WPA/WPA2 PSK attack tool.☆568Updated 3 years ago
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆205Updated 9 months ago
- Zero Infrastructure Password Cracking☆404Updated 8 months ago
- Update Version 3.1 added free SMS messaging.☆480Updated 3 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆221Updated 10 months ago
- Automated brute-forcing attack tool.☆403Updated 4 years ago
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities☆310Updated 9 months ago
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆900Updated last year
- WiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)☆258Updated 7 years ago
- ☆413Updated 2 years ago
- A web front-end for password cracking and analytics☆377Updated last week
- Turn PuTTY into an SSH login bruteforcing tool.☆284Updated 4 years ago
- Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.☆390Updated last year
- Hacking systems with the automation of PasteJacking attacks.☆397Updated 7 months ago
- Fast Modular Web Interfaces Bruteforcer☆224Updated 3 years ago
- SniperPhish - The Web-Email Spear Phishing Toolkit☆585Updated 2 weeks ago
- RomBuster is a router exploitation tool that allows to disclosure network router admin password.☆506Updated 9 months ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆492Updated last year
- Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3…☆304Updated 2 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆371Updated 2 years ago
- Modular penetration testing platform that enables you to write, test, and execute exploit code.☆304Updated 5 months ago
- Hide your payload into .jpg file☆394Updated 3 years ago
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆468Updated 4 months ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets☆236Updated 3 years ago
- Python 3.x based email spoofer☆243Updated last year
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆184Updated last year
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆525Updated last year