evilsocket / legbaLinks
A multiprotocol credentials bruteforcer / password sprayer and enumerator. π₯·
β1,666Updated this week
Alternatives and similar repositories for legba
Users that are interested in legba are comparing it to the libraries listed below
Sorting:
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.β2,083Updated 2 weeks ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,461Updated 2 years ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and hostβ¦β2,141Updated last month
- π Caido releases, wiki and roadmapβ1,691Updated 2 weeks ago
- The Network Execution Toolβ4,596Updated this week
- Quickly discover exposed hosts on the internet using multiple search engines.β2,694Updated last month
- RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust π¦β1,706Updated last month
- An XSS exploitation command-line interface and payload generator.β1,390Updated 7 months ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.β3,790Updated 3 months ago
- evilginx3 + gophishβ1,856Updated last year
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.β753Updated 7 months ago
- Generates millions of keyword-based password mutations in seconds.β1,337Updated 2 months ago
- SSH based reverse shellβ1,226Updated 2 weeks ago
- secator - the pentester's swiss knifeβ1,134Updated this week
- Microsoft-Outlook-Remote-Code-Execution-Vulnerabilityβ736Updated last year
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flawsβ3,642Updated 6 months ago
- Network Security Snifferβ813Updated 2 weeks ago
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attβ¦β5,385Updated last week
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, inβ¦β2,390Updated last year
- β2,031Updated last year
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.β1,159Updated 3 months ago
- Hash type identifier (CLI & lib)β894Updated this week
- Connect like there is no firewall. Securely.β1,724Updated last month
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/β1,787Updated 2 years ago
- Automatic SSTI detection tool with interactive interfaceβ1,154Updated last week
- π« Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fastβ¦β1,318Updated 2 months ago
- A tool to dump a git repository from a websiteβ2,247Updated this week
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,314Updated 7 months ago
- An OOB interaction gathering server and client libraryβ3,900Updated last week
- Notion as a platform for offensive operationsβ1,169Updated 2 years ago