arcaneiceman / kraken
Kraken: A multi-platform distributed brute-force password cracking system
☆313Updated last year
Alternatives and similar repositories for kraken:
Users that are interested in kraken are comparing it to the libraries listed below
- Automated WPA/WPA2 PSK attack tool.☆557Updated 3 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆364Updated last year
- Update Version 3.1 added free SMS messaging.☆476Updated 3 years ago
- Fast Modular Web Interfaces Bruteforcer☆217Updated 3 years ago
- Turn PuTTY into an SSH login bruteforcing tool.☆283Updated 4 years ago
- Automated rogue access point setup tool.☆192Updated 3 years ago
- Zero Infrastructure Password Cracking☆401Updated 6 months ago
- Framework RapidPayload - Metasploit Payload Generator | Crypter FUD AntiVirus Evasion☆410Updated 3 years ago
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆203Updated 7 months ago
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆891Updated last year
- SniperPhish - The Web-Email Spear Phishing Toolkit☆576Updated 10 months ago
- ☆410Updated last year
- DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets☆234Updated 3 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆487Updated 11 months ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆193Updated 3 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆216Updated 7 months ago
- This tool is design to find admin panel of any website by using custom wordlist or default wordlist easily and allow you to find admin pa…☆159Updated 4 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆368Updated 2 years ago
- Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any fir…☆344Updated 4 years ago
- Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3…☆301Updated 2 years ago
- Automated brute-forcing attack tool.☆396Updated 3 years ago
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆452Updated 2 months ago
- Hide your payload into .jpg file☆387Updated 3 years ago
- Exploit Pack contains a full set of 39.000+ exploits, you can be sure that your next pentest will become unstoppable. All operating syste…☆89Updated 3 years ago
- A simple script to generate a hidden url for social engineering.☆123Updated 4 years ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆380Updated 3 years ago
- A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module.☆163Updated 2 years ago
- tor_ip_switcher is useful for making any DoS attack look like a DDoS attack. Works with toriptables2.☆225Updated last year
- Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a…☆429Updated last month
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆107Updated last year