evilsocket / brutemachineLinks
A Go library which main purpose is giving an interface to loop over a dictionary and use those words/lines as input for some custom logic such as HTTP file bruteforcing, DNS bruteforcing, etc.
☆56Updated 8 years ago
Alternatives and similar repositories for brutemachine
Users that are interested in brutemachine are comparing it to the libraries listed below
Sorting:
- Mass scanning the internet (http and https) using a raw tcpstack.☆59Updated 8 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 3 years ago
- Drupal Honeypot☆57Updated 6 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- [ceased maintenance] An open source alternative to burp suite written in Go.☆156Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.☆30Updated 8 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Updated 7 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 12 years ago
- Search Nmap and Metasploit scanning scripts.☆55Updated 7 years ago
- ssh public host key scanner using shodan☆117Updated 6 years ago
- DNS Botnet Server and Client☆35Updated 6 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- Phishing toolkit for red teams and pentesters.☆126Updated 7 years ago
- 802.11 IDS, visualizer, and analytics platform for the web☆29Updated 2 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆123Updated 7 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆76Updated 2 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Hunt Open MongoDB instances☆79Updated 5 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69Updated 9 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- Upgrade your netcat shell today!☆60Updated 8 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- A very simple bridge for performing Flash HTTP requests with JavaScript☆80Updated 10 years ago
- Simple SSH brute-forcer written in Go☆21Updated 9 years ago
- Collection of tools for privesc on Linux☆34Updated 12 years ago
- Burp Commander written in Go☆58Updated 6 years ago