evilsocket / legbaLinks
A multiprotocol credentials bruteforcer / password sprayer and enumerator. π₯·
β1,635Updated last week
Alternatives and similar repositories for legba
Users that are interested in legba are comparing it to the libraries listed below
Sorting:
- Navigate the CVE jungle with ease.β2,045Updated this week
- The Network Execution Toolβ4,411Updated this week
- π Caido releases, wiki and roadmapβ1,651Updated 2 weeks ago
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, inβ¦β2,378Updated last year
- Quickly discover exposed hosts on the internet using multiple search engines.β2,642Updated 3 weeks ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,453Updated 2 years ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and hostβ¦β2,098Updated 11 months ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/β1,780Updated 2 years ago
- evilginx3 + gophishβ1,828Updated last year
- secator - the pentester's swiss knifeβ1,119Updated 2 weeks ago
- SSH based reverse shellβ1,147Updated last month
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.β1,142Updated 2 months ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.β3,641Updated last month
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attβ¦β5,305Updated last week
- Microsoft-Outlook-Remote-Code-Execution-Vulnerabilityβ730Updated last year
- Generates millions of keyword-based password mutations in seconds.β1,332Updated last month
- An XSS exploitation command-line interface and payload generator.β1,382Updated 5 months ago
- dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.β2,409Updated this week
- π« Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fastβ¦β1,292Updated 2 weeks ago
- An OOB interaction gathering server and client libraryβ3,844Updated this week
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flawsβ3,590Updated 4 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.β748Updated 6 months ago
- β2,000Updated last year
- Extract URLs, paths, secrets, and other interesting bits from JavaScriptβ1,588Updated last year
- Network Security Snifferβ802Updated last week
- Check your WAF before an attacker doesβ1,392Updated last week
- Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and moreβ1,788Updated 3 weeks ago
- Arsenal is just a quick inventory and launcher for hacking programsβ3,467Updated 7 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,278Updated 5 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.β936Updated 2 weeks ago