exbotanical / brutus
extensible exploitation framework shipped on a modular multi-tasking architecture
☆76Updated 2 years ago
Alternatives and similar repositories for brutus:
Users that are interested in brutus are comparing it to the libraries listed below
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆38Updated 2 years ago
- Koadic C3 COM Command & Control - JScript RAT☆43Updated 7 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 4 years ago
- gui tool to create normal payload by msfvenom☆32Updated 6 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆97Updated 3 years ago
- RDP EXPLOİT☆12Updated 5 years ago
- A Remote Access Tool using Google Apps Script as the proxy for command and control.☆112Updated 3 years ago
- Script to facilitate different functions and checks☆47Updated 2 years ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆54Updated 2 years ago
- Automate Metasploit scanning and exploitation☆115Updated 5 months ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 8 months ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆40Updated 4 years ago
- Simple but sharp ransomware☆34Updated 4 years ago
- ☆17Updated 5 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- ☆51Updated 4 years ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆30Updated 3 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆59Updated 3 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆40Updated 2 years ago
- Mobile Application Vulnerability Scanner☆20Updated 3 weeks ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads☆29Updated 4 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆51Updated 4 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆27Updated 5 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- Fully Undetectable telegram Rat dropper☆33Updated 4 years ago
- AAP Finder (Advanced Admin Page Finder) is a tool written in Python3 with advanced functionalities☆48Updated last year