evilsocket / legbaLinks
The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. π₯·
β1,779Updated 3 months ago
Alternatives and similar repositories for legba
Users that are interested in legba are comparing it to the libraries listed below
Sorting:
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.β2,276Updated this week
- The Network Execution Toolβ5,120Updated this week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,474Updated 3 years ago
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, inβ¦β2,428Updated last year
- Quickly discover exposed hosts on the internet using multiple search engines.β2,771Updated this week
- π Caido releases, wiki and roadmapβ2,021Updated 3 weeks ago
- β2,158Updated 2 years ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and hostβ¦β2,298Updated 5 months ago
- Hash type identifier (CLI & lib)β929Updated last week
- An XSS exploitation command-line interface and payload generator.β1,406Updated 11 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.β779Updated last year
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.β2,152Updated this week
- SSH based reverse shellβ1,302Updated last month
- π« Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fastβ¦β1,449Updated 6 months ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)β1,444Updated 2 weeks ago
- Generates millions of keyword-based password mutations in seconds.β1,401Updated 7 months ago
- Microsoft-Outlook-Remote-Code-Execution-Vulnerabilityβ754Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.β4,163Updated last month
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,386Updated 11 months ago
- Weakpass collection of tools for bruteforce and hashcrackingβ660Updated 3 weeks ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/β1,785Updated 3 years ago
- This map lists the essential techniques to bypass anti-virus and EDRβ2,971Updated 9 months ago
- Network Security Snifferβ836Updated last week
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flawsβ3,847Updated 3 months ago
- Check your WAF before an attacker doesβ1,459Updated 5 months ago
- Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data and Git history.β2,225Updated last month
- Dump cookies and credentials directly from Chrome/Edge process memoryβ1,390Updated 3 months ago
- Automatic SSTI detection tool with interactive interfaceβ1,313Updated 3 weeks ago
- A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities β¦β2,240Updated last year
- smbclient-ng, a fast and user friendly way to interact with SMB shares.β987Updated 2 months ago