Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools.
☆22Jul 13, 2020Updated 5 years ago
Alternatives and similar repositories for crowbar
Users that are interested in crowbar are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Last Web Recon Tool You'll Need☆17Nov 7, 2020Updated 5 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Mar 14, 2018Updated 8 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆12Apr 22, 2018Updated 7 years ago
- Phishing Campaign Toolkit☆13Nov 9, 2021Updated 4 years ago
- Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions☆12Apr 24, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Homemade scripts to-do various vulnerable challenges☆79Jan 7, 2021Updated 5 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆101Updated this week
- ☆15May 17, 2018Updated 7 years ago
- A tool for harvesting sysadmin credentials in Linux☆20Jul 10, 2024Updated last year
- Proof of concept that uses cosign and GitHub's in built OIDC for actions to sign container images, providing a proof that what is in the …☆14Jan 31, 2023Updated 3 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- Personal Collection of Operating Systems Scripts☆573May 16, 2024Updated last year
- ☆13Nov 5, 2017Updated 8 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Oct 7, 2013Updated 12 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- IRC bot framework written in Python.☆30Mar 20, 2021Updated 5 years ago
- ☆13May 9, 2017Updated 8 years ago
- This project is aimed to automate hacking by a USB. Currently for Windows, different platforms coming soon☆11Feb 16, 2020Updated 6 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Oct 1, 2016Updated 9 years ago
- ☆19Dec 8, 2014Updated 11 years ago
- Inline file transfer using in-built Windows tools (DEBUG.exe or PowerShell).☆318Apr 27, 2020Updated 5 years ago
- Template Quizzes & Assignment Answers for Google Digital Marketing And Ecommerce on Coursera.☆16Jun 12, 2023Updated 2 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Feb 6, 2022Updated 4 years ago
- Imported from https://gitorious.org/beagleboard-usbsniffer/☆15Oct 19, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automatizated bash script to invade WPA2 networks with wordlist method☆18Apr 8, 2019Updated 7 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49May 16, 2017Updated 8 years ago
- Notifications when metasploit msf session up or down in telegram.☆11Feb 20, 2018Updated 8 years ago
- MSFvenom Payload Creator (MSFPC)☆1,323May 9, 2021Updated 4 years ago
- Portable utility to execute in memory a sequence of opcodes☆18Aug 28, 2016Updated 9 years ago
- Customize Exploit Codes.☆18Dec 1, 2016Updated 9 years ago
- Web interface for recon-ng☆14Nov 22, 2015Updated 10 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- Rex library for text generation and manipulation☆21Apr 10, 2026Updated last week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Maybe you're a guy a bit like me -- who watch a lot of series -- so I guess you already know that downloading the latest episodes of all …☆21Apr 27, 2015Updated 10 years ago
- Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition, published by Packt☆28Jan 18, 2023Updated 3 years ago
- This repository contains some bettercap transparent proxy example modules.☆16Nov 28, 2017Updated 8 years ago
- Creating a Cybersecurity Resume: Tips and Resources" is a comprehensive guide to crafting an effective and professional cybersecurity res…☆15Jan 8, 2023Updated 3 years ago
- My collection of nmap nse modules☆64Oct 19, 2019Updated 6 years ago
- laboratório sobre buffer overflows☆15Apr 17, 2017Updated 9 years ago
- A free, open source, self-hosted alternative to meetup.com☆19Dec 9, 2021Updated 4 years ago