ex0dus-0x / brute
☆510Updated this week
Related projects: ⓘ
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆357Updated 7 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆712Updated 4 years ago
- Linux bash script automation for metasploit☆253Updated 5 years ago
- Git all your favorite tools in one click☆261Updated 2 years ago
- Inject malicious code into *.debs☆261Updated 2 years ago
- The New Hacking Framework☆677Updated 3 years ago
- ☆410Updated this week
- A Phishing Dropper designed to Pentest.☆261Updated 7 years ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆414Updated 6 years ago
- ☆355Updated this week
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆242Updated 3 years ago
- Hakku Framework penetration testing☆306Updated 2 years ago
- Tools for information gathering☆330Updated 3 months ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆891Updated 4 years ago
- Auto Scanning to SSL Vulnerability☆618Updated 3 years ago
- CyberScan: Network's Forensics ToolKit☆423Updated 5 years ago
- NXcrypt - 'python backdoor' framework☆363Updated 7 years ago
- ☆220Updated this week
- Intelligent login bruteforcer.☆837Updated last year
- Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).☆591Updated last year
- An advanced multithreaded admin panel finder written in python.☆722Updated 4 months ago
- ☆243Updated this week
- PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo☆462Updated 7 years ago
- Automatically exported from code.google.com/p/ghost-phisher☆307Updated 4 years ago
- information gathering via dorks☆373Updated 2 years ago
- Multiplatform payload dropper☆247Updated 3 years ago
- Hacking systems with the automation of PasteJacking attacks.☆381Updated 5 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆435Updated 7 years ago
- ☆185Updated this week
- CMS auto detect and exploit.☆361Updated 2 years ago