brows3r / CrowbarLinks
A windows post exploitation tool that contains a lot of features for information gathering and more.
β47Updated 4 years ago
Alternatives and similar repositories for Crowbar
Users that are interested in Crowbar are comparing it to the libraries listed below
Sorting:
- Ded Security Framework is a tool aimed at security professionalsβ35Updated last year
- ππ Red Network Tool is a tool for network exploration and info finding.β40Updated 3 years ago
- Dogma V1.5.3β29Updated 5 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.β81Updated 5 months ago
- Make a Fake wireless access point aka Evil Twin....Easily!!β70Updated 2 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbUβ13Updated 2 years ago
- Simple script to bulk check if IPs match networksβ12Updated 3 years ago
- Automated sqlmapβ21Updated 3 years ago
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can bruteβ¦β33Updated 3 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)β19Updated 2 years ago
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it batβ¦β50Updated 4 years ago
- DragonMS is Tools for ddos, scanner, tracker, payload generator msfvenom and scrapingβ78Updated 3 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )β35Updated 5 years ago
- FHook is a Command and Control server which allows an individual to accept connections from multiple remote clients via a remote access tβ¦β14Updated last year
- Generate Undetectable Metasploit Payload in a simple wayβ38Updated last year
- Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming languagβ¦β45Updated 8 months ago
- H-SPLOIT-PAYLOAD GENERATE METASPLOIT PAYLOAD IN 1 CLICKβ32Updated 3 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's reβ¦β23Updated 4 years ago
- Hax is a mini-tool with really useful hacking tools.β19Updated 2 years ago
- Hacking every email by use script Mr.Robotβ49Updated 6 years ago
- π₯Ready, Aim, Fire.π₯β16Updated 3 years ago
- Script to facilitate different functions and checksβ46Updated 2 years ago
- Proof of concept denial of service over TOR stress test toolβ41Updated 6 years ago
- Interactive shell to execute commands anonymously using Proxychains and Torβ41Updated 2 years ago
- A very user friendly and advanced phishing toolkit made for hackersβ29Updated 3 years ago
- Send anonymous text messages with TOR and the TextBelt APIβ67Updated 4 years ago
- β29Updated 3 years ago
- Worm/Trojan/Ransomware/apt/Rootkit/Virus Databaseβ96Updated 8 months ago
- Ro3b - Advance Banking HTTP Botnetβ51Updated 2 years ago
- List of RAT's For android. To get any support on them contact t.me/efxtvβ47Updated last week