DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly
☆65Jan 11, 2023Updated 3 years ago
Alternatives and similar repositories for nozzlr
Users that are interested in nozzlr are comparing it to the libraries listed below
Sorting:
- The fastest (and least featureful) DNS bruteforcer in the South☆27Dec 31, 2019Updated 6 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Crack any ftp server by using FTP Crack Elite tool kit, ftp bruteforce☆12Nov 7, 2017Updated 8 years ago
- A Python DNS crawler to find identical domain names under different TLDs.☆25May 18, 2019Updated 6 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- Tunnel IP over ICMP.☆16Jul 13, 2016Updated 9 years ago
- Scripts for pentesting/hacking☆18Jan 22, 2022Updated 4 years ago
- A Directory Bruteforcing Tool That Makes Your Life Easier!☆17Aug 29, 2023Updated 2 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Feb 23, 2017Updated 9 years ago
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year
- Detect silent (unwanted) changes to files on your system☆162May 4, 2020Updated 5 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Docker configs and build scripts.☆22Dec 21, 2014Updated 11 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- Asynchronous public DNS auditing tool☆11May 22, 2023Updated 2 years ago
- record metrics and logs☆10Apr 2, 2018Updated 7 years ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- ☆12Sep 25, 2020Updated 5 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Yet Another Fake Honeypot written in Go☆10Dec 8, 2017Updated 8 years ago
- Telegram Android Passcode BruteForcer☆10Nov 17, 2017Updated 8 years ago
- Simple Mega.co.nz Account Bruteforce Tool☆13Apr 15, 2017Updated 8 years ago
- BinaryView Plugin for Microcorruption CTF memory dumps☆13Jul 16, 2019Updated 6 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Various Cheat Sheets☆183Jun 24, 2021Updated 4 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Nov 30, 2017Updated 8 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆54Mar 19, 2024Updated last year
- Random experiments in C☆15Sep 30, 2020Updated 5 years ago
- honeypot go lang emulators☆11Feb 28, 2016Updated 10 years ago
- Compute memory usage of a piece of software with strace.☆11Sep 17, 2019Updated 6 years ago
- Tools and library to manipulate EFI variables.☆10Updated this week
- Manage the metasploit framework database☆16Nov 8, 2020Updated 5 years ago
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆13Nov 28, 2018Updated 7 years ago
- Listen to the soothing sounds of attacks and anomalies detected by the Signal Sciences web protection platform.☆10Oct 1, 2018Updated 7 years ago