Bruteforce attack blocker (ssh, FTP, SMTP, and more)
☆64Feb 11, 2026Updated 3 weeks ago
Alternatives and similar repositories for sentry
Users that are interested in sentry are comparing it to the libraries listed below
Sorting:
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Sep 7, 2017Updated 8 years ago
- Windows Crypt API hook to generate weak keys☆47Nov 1, 2016Updated 9 years ago
- ☆16May 9, 2016Updated 9 years ago
- Raku implementation of various digests☆27Feb 28, 2025Updated last year
- Right-To-Left Override POC☆35Mar 21, 2022Updated 3 years ago
- Subdomain Analyzer☆77Apr 18, 2017Updated 8 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Sep 15, 2013Updated 12 years ago
- Auto Reaver - multiple access point attack using Reaver☆52Feb 1, 2017Updated 9 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆12Jul 30, 2021Updated 4 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Aug 13, 2021Updated 4 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last week
- Perl 5 to Perl 6 Translator☆22Dec 18, 2022Updated 3 years ago
- A hidden android SMS interceptor that forwards every message☆21Jul 5, 2023Updated 2 years ago
- ☆66Feb 10, 2018Updated 8 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Apr 20, 2020Updated 5 years ago
- Tool to find stored robots.txt files from the past☆19Jun 4, 2023Updated 2 years ago
- Guaranteed cracking of PDF files using RC4 40-bit encryption☆20Dec 9, 2012Updated 13 years ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- Red Login: SSH Brute-force Tools☆106Jun 28, 2018Updated 7 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆23Nov 22, 2021Updated 4 years ago
- Protect your Wireless Network from Evil Access Points!☆183Jul 18, 2023Updated 2 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Automatic detection of hashing algorithms☆20Jun 18, 2016Updated 9 years ago
- A Cloudflare resolver that works☆145Jul 1, 2019Updated 6 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago
- Search exploits in multiple exploit databases!☆85Oct 1, 2020Updated 5 years ago
- ☆83Feb 3, 2017Updated 9 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆263Oct 31, 2017Updated 8 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Mar 8, 2015Updated 11 years ago
- A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard☆31Sep 2, 2023Updated 2 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Sep 2, 2016Updated 9 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Network Mapping and Enumeration Framework☆22Nov 11, 2015Updated 10 years ago
- Small tool for disassembling shellcode (using objdump)☆149Jun 19, 2022Updated 3 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Dec 8, 2015Updated 10 years ago