mandiant / gocrackLinks
GoCrack is a management frontend for password cracking tools written in Go
☆1,254Updated 4 months ago
Alternatives and similar repositories for gocrack
Users that are interested in gocrack are comparing it to the libraries listed below
Sorting:
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,010Updated 8 years ago
- A tool to abuse Exchange services☆2,266Updated last year
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,215Updated 5 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,319Updated 4 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,112Updated 7 years ago
- A web front-end for password cracking and analytics☆622Updated 3 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,436Updated 2 years ago
- Advanced Honeypot framework.☆1,281Updated 2 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆826Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,379Updated 3 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,266Updated last year
- NSA finest tool☆983Updated 8 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,862Updated last year
- Interactive Network Scanner☆1,031Updated 5 years ago
- Sniffs sensitive data from interface or pcap☆1,789Updated last year
- A post-exploitation OS X/Linux agent written in Python 2.7☆870Updated 8 years ago
- online port scan scraper☆1,116Updated 2 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.☆913Updated 4 years ago
- Queue and resource system for cracking passwords☆388Updated 3 years ago
- framework to rapidly implement custom droppers for all three major operating systems☆701Updated last year
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆524Updated 4 years ago
- The best way to scan for weak ssh passwords on your network☆616Updated last year
- A database of common, interesting or useful commands, in one handy referable form☆751Updated last year
- Data exfiltration over DNS request covert channel☆874Updated last year
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,006Updated 4 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948Updated 6 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,609Updated 6 years ago
- Command line utility for searching and downloading exploits☆1,783Updated last month
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,302Updated 3 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆783Updated 5 years ago