brows3r / CrowbarLinks
A windows post exploitation tool that contains a lot of features for information gathering and more.
☆46Updated 4 years ago
Alternatives and similar repositories for Crowbar
Users that are interested in Crowbar are comparing it to the libraries listed below
Sorting:
- HacKing Tools Downloader: Downloading HacKing Tools and exporting by categories to $HOME directory☆84Updated 2 years ago
- ☆10Updated 4 years ago
- Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming languag…☆44Updated 7 months ago
- Dogma V1.5.3☆30Updated 5 years ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- ⚡ Create infinate UAC prompts forcing a user to run as admin ⚡☆12Updated 3 years ago
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆50Updated 4 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆13Updated 2 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆18Updated 2 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- XDROID is android all in one hack tools☆39Updated 2 months ago
- Simple script to bulk check if IPs match networks☆12Updated 3 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆69Updated 2 years ago
- 🌐🔍 Red Network Tool is a tool for network exploration and info finding.☆40Updated 3 years ago
- 🔥Ready, Aim, Fire.🔥☆16Updated 3 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆23Updated 4 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆79Updated 5 months ago
- Binaries Payloads Web Payloads Scripting Payloads Shellcode☆39Updated 6 years ago
- Script to facilitate different functions and checks☆46Updated 2 years ago
- steal chrome saved passwords "undetectable"☆50Updated 3 years ago
- Tsunami-Fi is simple multi-tool bash application for Wi-Fi attacks☆65Updated 2 years ago
- Complete and modifyable ransomware program☆11Updated 4 years ago
- DASH is deep osint Scanner. You just need username to start osint scan.☆48Updated 2 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆42Updated 2 years ago
- Hacking with PasteJacking technique☆22Updated 11 months ago
- Payload delivery via URL and some social engineering.☆17Updated 10 months ago
- Cracking protocols FTP and SSH.☆12Updated 9 months ago
- A OSINT tool to obtain a target's phone number just by having his email address☆30Updated 5 years ago