jofpin / bruttoLinks
Easy brute forcing to whatever you want - Jose Pino
☆65Updated 10 years ago
Alternatives and similar repositories for brutto
Users that are interested in brutto are comparing it to the libraries listed below
Sorting:
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 8 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆55Updated 4 years ago
- It is a tool that brings together exploits and news about security and vulnerabilities, with the intention of contributing to the open so…☆64Updated 6 years ago
- web information gathering / Grab links☆44Updated 6 years ago
- Bramble is a hacking Open source suite.☆84Updated 5 years ago
- Google Hack Database dork automatic tool.☆25Updated 8 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 7 years ago
- A tool to harvest credentials from leaked data dump☆77Updated 4 years ago
- Arcane is a simple script designed to backdoor iOS packages (iphone-arm) and create the necessary resources for APT repositories.☆155Updated 5 years ago
- Passwords Recovery Tool☆21Updated 6 years ago
- Package manager for hackers built by hackers☆37Updated 7 years ago
- Information gathering tool - OSINT☆39Updated 6 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 4 months ago
- A simple phishing tool that can phish almost any website☆79Updated 7 years ago
- Record X11 keypress events to a log file☆27Updated 7 years ago
- Devploit v 1.1 Information Gathering Tool☆33Updated 8 years ago
- Gmail phishing page sample☆69Updated 5 years ago
- Python util to retrieve full display name and profile picture from a single email address☆103Updated 4 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆55Updated 5 years ago
- Pentest ToolKit☆28Updated 5 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆63Updated 5 years ago
- Use Tor for anonymous scanning with nmap☆86Updated 10 years ago
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆42Updated 6 years ago
- Disposable Mails From Command Line☆33Updated 5 years ago
- ☆53Updated 4 years ago
- Advance Google Dorker and Vulnerability Scanner☆49Updated 7 years ago
- ☆30Updated 5 years ago
- Search .git folders for emails and URL's that should otherwise be hidden☆34Updated 4 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆44Updated 6 years ago