evilsocket / legbaLinks
The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. π₯·
β1,791Updated 4 months ago
Alternatives and similar repositories for legba
Users that are interested in legba are comparing it to the libraries listed below
Sorting:
- The Network Execution Toolβ5,234Updated last week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.β2,353Updated 2 weeks ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,475Updated 3 years ago
- Quickly discover exposed hosts on the internet using multiple search engines.β2,816Updated last month
- π Caido releases, wiki and roadmapβ2,147Updated last week
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and hostβ¦β2,299Updated 6 months ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.β4,255Updated 2 months ago
- An XSS exploitation command-line interface and payload generator.β1,414Updated last year
- An OOB interaction gathering server and client libraryβ4,165Updated this week
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flawsβ3,887Updated 4 months ago
- evilginx3 + gophishβ1,949Updated last year
- SSH based reverse shellβ1,314Updated last week
- π« Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fastβ¦β1,481Updated 7 months ago
- Network Security Snifferβ838Updated last month
- Hash type identifier (CLI & lib)β936Updated 2 weeks ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,403Updated last year
- β2,181Updated 2 years ago
- Real-world infosec wordlists, updated regularlyβ1,630Updated this week
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attβ¦β5,700Updated last week
- Generates millions of keyword-based password mutations in seconds.β1,403Updated 7 months ago
- Notion as a platform for offensive operationsβ1,176Updated 2 years ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.β1,287Updated last week
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/β1,783Updated 3 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.β2,166Updated last month
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methodsβ1,470Updated 2 years ago
- Automatic SSTI detection tool with interactive interfaceβ1,357Updated 3 weeks ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.β782Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory toolsβ2,148Updated last month
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, inβ¦β2,432Updated last year
- βοΈπ€« Stealth redirector for your red team operation securityβ1,061Updated 7 months ago