hcbaker / KlydaLinks
Highly configurable script for dictionary/spray attacks against online web applications.
β53Updated 3 years ago
Alternatives and similar repositories for Klyda
Users that are interested in Klyda are comparing it to the libraries listed below
Sorting:
- γπ₯γCVE-2022-33891 - Apache Spark Command Injectionβ26Updated 3 years ago
- Enumeration & fingerprint toolβ24Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Toolβ53Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.β40Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.β21Updated 2 years ago
- Modular framework to exploit UPS devicesβ66Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.β63Updated 3 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strikeβ52Updated 3 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phraseβ33Updated 3 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a brβ¦β31Updated 2 years ago
- Tools used for Pentestingβ21Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalwareβ54Updated 3 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitationβ38Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.β26Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Frameworkβ22Updated 3 years ago
- APK Infrastructure Investigatorβ65Updated 2 years ago
- Bash script for CTF automating basic enumerationβ43Updated 3 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.β107Updated last year
- A simple utility to perform reverse WHOIS lookups using whoisxml APIβ44Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suiteβ40Updated 2 years ago
- β43Updated 6 months ago
- This is a working variant of the Mirai IOT botnetβ14Updated 2 years ago
- Automate All Pivoting System Enumeration with this Bash Scriptβ13Updated 3 years ago
- It was developed to speed up the processes of SOC Analysts during analysisβ47Updated last year
- A Red Teaming tool focused on profiling the target.β28Updated 4 months ago
- A BASH Script to automate the installation of the most popular bug bounty toolsβ22Updated last year
- Google Meet Phishing Template For Gophishβ46Updated 3 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without lockiβ¦β38Updated this week
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential riskβ¦β29Updated 2 years ago
- Subtron is a professional grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty huntβ¦β24Updated last week