evilsocket / legbaLinks
The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. π₯·
β1,738Updated 2 weeks ago
Alternatives and similar repositories for legba
Users that are interested in legba are comparing it to the libraries listed below
Sorting:
- The Network Execution Toolβ4,748Updated last week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.β2,110Updated last week
- π Caido releases, wiki and roadmapβ1,797Updated last week
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and hostβ¦β2,262Updated 2 months ago
- Quickly discover exposed hosts on the internet using multiple search engines.β2,711Updated this week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,465Updated 2 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/β1,786Updated 2 years ago
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attβ¦β5,446Updated this week
- SSH based reverse shellβ1,251Updated 2 weeks ago
- Hash type identifier (CLI & lib)β911Updated last month
- dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.β2,517Updated last week
- An XSS exploitation command-line interface and payload generator.β1,397Updated 8 months ago
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flawsβ3,710Updated 7 months ago
- Arsenal is just a quick inventory and launcher for hacking programsβ3,577Updated 10 months ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.β3,952Updated 4 months ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScriptβ1,640Updated last year
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,335Updated 8 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.β2,082Updated last month
- Generates millions of keyword-based password mutations in seconds.β1,359Updated 3 months ago
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, inβ¦β2,392Updated last year
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.β1,569Updated last year
- An OOB interaction gathering server and client libraryβ3,969Updated last week
- Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data and Git history.β2,131Updated 2 weeks ago
- Six Degrees of Domain Adminβ2,415Updated last week
- π« Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fastβ¦β1,351Updated 3 months ago
- Microsoft-Outlook-Remote-Code-Execution-Vulnerabilityβ740Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory toolsβ2,065Updated last month
- π gowitness - a golang, web screenshot utility using Chrome Headlessβ3,958Updated 4 months ago
- secator - the pentester's swiss knifeβ1,150Updated 2 weeks ago
- evilginx3 + gophishβ1,876Updated last year