evilsocket / legbaLinks
A multiprotocol credentials bruteforcer / password sprayer and enumerator. π₯·
β1,594Updated 3 months ago
Alternatives and similar repositories for legba
Users that are interested in legba are comparing it to the libraries listed below
Sorting:
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,441Updated 2 years ago
- Quickly discover exposed hosts on the internet using multiple search engines.β2,605Updated last week
- An OOB interaction gathering server and client libraryβ3,790Updated last week
- Navigate the CVE jungle with ease.β2,010Updated last month
- The Network Execution Toolβ4,239Updated this week
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flawsβ3,540Updated 3 months ago
- Real-world infosec wordlists, updated regularlyβ1,510Updated this week
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and hostβ¦β2,083Updated 10 months ago
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attβ¦β5,206Updated last week
- An XSS exploitation command-line interface and payload generator.β1,375Updated 4 months ago
- dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.β2,374Updated 2 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.β1,106Updated 3 weeks ago
- Check your WAF before an attacker doesβ1,372Updated last week
- π Caido releases, wiki and roadmapβ1,582Updated 2 weeks ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rulesβ¦β5,686Updated 10 months ago
- Hash type identifier (CLI & lib)β875Updated last month
- evilginx3 + gophishβ1,800Updated 11 months ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScriptβ1,560Updated last year
- Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and moreβ1,717Updated 3 weeks ago
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.β1,546Updated last year
- π« Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fastβ¦β1,262Updated last month
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/β1,774Updated 2 years ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.β4,374Updated 5 months ago
- ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.β4,304Updated this week
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methodsβ1,443Updated last year
- A simple tool for bypassing file upload restrictions.β853Updated 10 months ago
- Rockyou for web fuzzingβ2,810Updated 2 weeks ago
- File upload vulnerability scanner and exploitation tool.β3,208Updated 3 weeks ago
- Network Security Snifferβ790Updated last month
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.β3,509Updated last week