Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools.
☆22Jul 13, 2020Updated 5 years ago
Alternatives and similar repositories for crowbar
Users that are interested in crowbar are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Directory/file & DNS busting tool written in Go☆14Nov 26, 2019Updated 6 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Mar 14, 2018Updated 8 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆12Apr 22, 2018Updated 7 years ago
- Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions☆12Apr 24, 2017Updated 8 years ago
- Homemade scripts to-do various vulnerable challenges☆79Jan 7, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆100Mar 20, 2026Updated last week
- ☆15May 17, 2018Updated 7 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- Personal fork of Kippo SSH honeypot.☆13May 25, 2014Updated 11 years ago
- Proof of concept that uses cosign and GitHub's in built OIDC for actions to sign container images, providing a proof that what is in the …☆14Jan 31, 2023Updated 3 years ago
- Connect to Cisco AnyConnect VPN and open a Microsoft Remote Desktop (RDP) window☆11Aug 9, 2023Updated 2 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- Personal Collection of Operating Systems Scripts☆572May 16, 2024Updated last year
- ☆13Nov 5, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Oct 7, 2013Updated 12 years ago
- IRC bot framework written in Python.☆30Mar 20, 2021Updated 5 years ago
- a .js scanner, built in php. designed to scrape urls and other info☆13Jul 20, 2017Updated 8 years ago
- This project is aimed to automate hacking by a USB. Currently for Windows, different platforms coming soon☆11Feb 16, 2020Updated 6 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Oct 1, 2016Updated 9 years ago
- Chrome Extension for XSS Hunter Payloads☆14Sep 7, 2016Updated 9 years ago
- Inline file transfer using in-built Windows tools (DEBUG.exe or PowerShell).☆317Apr 27, 2020Updated 5 years ago
- aarch64-cortex_a53-linux-gnueabi Toolchain☆11Aug 10, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Feb 6, 2022Updated 4 years ago
- Imported from https://gitorious.org/beagleboard-usbsniffer/☆15Oct 19, 2015Updated 10 years ago
- Automatizated bash script to invade WPA2 networks with wordlist method☆18Apr 8, 2019Updated 6 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49May 16, 2017Updated 8 years ago
- Notifications when metasploit msf session up or down in telegram.☆11Feb 20, 2018Updated 8 years ago
- MSFvenom Payload Creator (MSFPC)☆1,317May 9, 2021Updated 4 years ago
- Customize Exploit Codes.☆18Dec 1, 2016Updated 9 years ago
- Drupal 7.x Services Module Remote Code Execution Exploit - https://www.ambionics.io/blog/drupal-services-module-rce☆14Mar 9, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- Rex library for text generation and manipulation☆21Apr 9, 2025Updated 11 months ago
- Maybe you're a guy a bit like me -- who watch a lot of series -- so I guess you already know that downloading the latest episodes of all …☆21Apr 27, 2015Updated 10 years ago
- Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition, published by Packt☆28Jan 18, 2023Updated 3 years ago
- misc stuff☆19Jun 1, 2017Updated 8 years ago
- This repository contains some bettercap transparent proxy example modules.☆16Nov 28, 2017Updated 8 years ago
- My collection of nmap nse modules☆64Oct 19, 2019Updated 6 years ago