Bruteforce database
☆1,661Feb 26, 2026Updated last week
Alternatives and similar repositories for bruteforce-database
Users that are interested in bruteforce-database are comparing it to the libraries listed below
Sorting:
- Automatically brute force all services running on a target.☆2,224Aug 18, 2024Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆69,212Updated this week
- A powerful and useful hacker dictionary builder for a brute-force attack☆3,589Dec 5, 2024Updated last year
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆770Apr 5, 2020Updated 5 years ago
- Collection of some common wordlists such as RDP password, user name list, ssh password wordlist for brute force. IP Cameras Default Passw…☆1,729Aug 14, 2022Updated 3 years ago
- Bruteforce attack for Instagram.☆4,881Jul 9, 2024Updated last year
- Some files for bruteforcing certain things.☆1,400Feb 18, 2026Updated 2 weeks ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs☆2,519Apr 9, 2024Updated last year
- hydra☆11,686Feb 7, 2026Updated last month
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,222Oct 4, 2023Updated 2 years ago
- OWASP WEB Directory Scanner☆919Jan 12, 2026Updated last month
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,903Sep 27, 2021Updated 4 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,807Feb 23, 2026Updated last week
- Official Black Hat Arsenal Security Tools Repository☆4,231Aug 26, 2024Updated last year
- Web path scanner☆14,042Feb 20, 2026Updated 2 weeks ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,052Mar 17, 2024Updated last year
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,962Nov 17, 2025Updated 3 months ago
- Exploitation Framework for Embedded Devices☆13,014Updated this week
- Intelligent login bruteforcer.☆909Apr 27, 2023Updated 2 years ago
- An automated bitcoin wallet brute-forcer☆1,382Jan 4, 2026Updated 2 months ago
- Attack Surface Management Platform☆9,435Feb 15, 2026Updated 2 weeks ago
- Bruteforce attack on Facebook account using python script☆2,106May 11, 2024Updated last year
- Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for …☆4,575Oct 10, 2023Updated 2 years ago
- Git All the Payloads! A collection of web attack payloads.☆3,908May 15, 2023Updated 2 years ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,237Jul 1, 2020Updated 5 years ago
- Wordlist for content(directory) bruteforce discovering with Burp or dirsearch☆217Oct 12, 2024Updated last year
- Potentially dangerous files☆3,275Aug 25, 2025Updated 6 months ago
- A swiss army knife for pentesting networks☆9,086Dec 6, 2023Updated 2 years ago
- It's a tool which generate a dictionary from a csv containing personals informations. Generate all common passwords based on perso info.…☆56Oct 1, 2020Updated 5 years ago
- Firewall bypass script based on shodan search results☆14Jun 5, 2019Updated 6 years ago
- Proof -Of-Concept Brute Force Login on a web-site with a good dictionary of words☆298Jun 2, 2021Updated 4 years ago
- In-depth attack surface mapping and asset discovery☆14,193Updated this week
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,835Nov 10, 2023Updated 2 years ago
- Automated All-in-One OS Command Injection Exploitation Tool☆5,645Feb 28, 2026Updated last week
- Next generation web scanner☆6,434Oct 19, 2025Updated 4 months ago
- HostHunter a recon tool for discovering hostnames using OSINT techniques.☆1,156Mar 30, 2023Updated 2 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,941Mar 22, 2024Updated last year
- Mass scan IPs for vulnerable services☆1,046Feb 17, 2022Updated 4 years ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,448May 6, 2024Updated last year