evilsocket / legbaLinks
The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. π₯·
β1,774Updated 2 months ago
Alternatives and similar repositories for legba
Users that are interested in legba are comparing it to the libraries listed below
Sorting:
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.β2,224Updated last week
- The Network Execution Toolβ5,004Updated last week
- π Caido releases, wiki and roadmapβ1,967Updated last week
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and hostβ¦β2,290Updated 4 months ago
- Quickly discover exposed hosts on the internet using multiple search engines.β2,766Updated 2 weeks ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,472Updated 3 years ago
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attβ¦β5,577Updated this week
- An OOB interaction gathering server and client libraryβ4,080Updated last week
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, inβ¦β2,423Updated last year
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/β1,784Updated 2 years ago
- dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.β2,594Updated last week
- Extract URLs, paths, secrets, and other interesting bits from JavaScriptβ1,707Updated last year
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.β779Updated 11 months ago
- Hash type identifier (CLI & lib)β923Updated 3 months ago
- An XSS exploitation command-line interface and payload generator.β1,404Updated 10 months ago
- Generates millions of keyword-based password mutations in seconds.β1,385Updated 6 months ago
- π« Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fastβ¦β1,391Updated 5 months ago
- SSH based reverse shellβ1,296Updated 2 weeks ago
- Real-world infosec wordlists, updated regularlyβ1,597Updated this week
- Network Security Snifferβ837Updated 2 months ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.β4,136Updated last week
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.β1,303Updated 7 months ago
- secator - the pentester's swiss knifeβ1,189Updated last week
- Microsoft-Outlook-Remote-Code-Execution-Vulnerabilityβ754Updated last year
- Go CLI and Library for quickly mapping organization network ranges using ASN information.β976Updated this week
- β2,131Updated 2 years ago
- Automatic SSTI detection tool with interactive interfaceβ1,289Updated 3 months ago
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.β1,580Updated last year
- A fast, simple, recursive content discovery tool written in Rust.β7,320Updated this week
- A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities β¦β2,234Updated last year