brows3r / Crowbar
A windows post exploitation tool that contains a lot of features for information gathering and more.
☆46Updated 3 years ago
Alternatives and similar repositories for Crowbar:
Users that are interested in Crowbar are comparing it to the libraries listed below
- Ded Security Framework is a tool aimed at security professionals☆34Updated 10 months ago
- Automated sqlmap☆20Updated 2 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆17Updated 2 years ago
- Dogma V1.5.3☆28Updated 5 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆35Updated 5 years ago
- Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming languag…☆44Updated 5 months ago
- HacKing Tools Downloader: Downloading HacKing Tools and exporting by categories to $HOME directory☆82Updated 2 years ago
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆51Updated 4 years ago
- Reverse And Dorking Tools☆25Updated 3 years ago
- A very user friendly and advanced phishing toolkit made for hackers☆27Updated 3 years ago
- 🔥Ready, Aim, Fire.🔥☆16Updated 2 years ago
- ⚡ Create infinate UAC prompts forcing a user to run as admin ⚡☆12Updated 2 years ago
- DragonMS is Tools for ddos, scanner, tracker, payload generator msfvenom and scraping☆78Updated 3 years ago
- 🌐🔍 Red Network Tool is a tool for network exploration and info finding.☆40Updated 3 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- Script to facilitate different functions and checks☆47Updated 2 years ago
- ☆29Updated 3 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆66Updated last year
- Cracking protocols FTP and SSH.☆11Updated 7 months ago
- Simple script to bulk check if IPs match networks☆12Updated 3 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- H-SPLOIT-PAYLOAD GENERATE METASPLOIT PAYLOAD IN 1 CLICK☆29Updated 3 years ago
- Fast exploitation based on metasploit.☆73Updated 5 years ago
- ☆12Updated last year
- Information Gathering Simplified.☆64Updated 2 years ago
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆33Updated 2 years ago
- Hacking every email by use script Mr.Robot☆48Updated 6 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆74Updated 2 months ago
- phishfactory offers a variety of email templates for spear-phishing attacks. [more templates to still be added]☆21Updated 4 years ago
- Cryptowall Ransomware from Mr Robot serie S2E1 and S2E2☆26Updated 10 months ago