nmap / ncrackLinks
Ncrack network authentication tool
☆1,141Updated last year
Alternatives and similar repositories for ncrack
Users that are interested in ncrack are comparing it to the libraries listed below
Sorting:
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,309Updated 3 years ago
- AntiVirus Evasion Tool☆1,710Updated 2 months ago
- A framework for layer 2 attacks☆778Updated last year
- Unified repository for different Metasploit Framework payloads☆1,844Updated 3 weeks ago
- Medusa is a speedy, parallel, and modular, login brute-forcer.☆777Updated last month
- MSFvenom Payload Creator (MSFPC)☆1,269Updated 4 years ago
- Network Infrastructure Penetration Testing Tool☆1,652Updated 4 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,260Updated last week
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb-bin-sploits☆1,789Updated 2 years ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,360Updated last year
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,843Updated last year
- Undetectable Windows Payload Generation☆1,601Updated 2 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,426Updated 2 years ago
- Automatically exported from code.google.com/p/armitage☆547Updated 3 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,383Updated last year
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,743Updated last month
- Miscellaneous exploit code☆1,556Updated last year
- Veil Evasion is no longer supported, use Veil 3.0!☆1,837Updated 3 years ago
- dnsenum is a perl script that enumerates DNS information☆640Updated 5 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,282Updated 3 years ago
- IPv6 attack toolkit☆1,092Updated 4 months ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,549Updated 8 months ago
- Python antivirus evasion tool☆1,431Updated last year
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,667Updated 7 months ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,107Updated 7 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,444Updated last year
- Find exploits in local and online databases instantly☆1,739Updated 3 years ago
- SMBMap is a handy SMB enumeration tool☆1,921Updated 3 months ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,734Updated last week
- Veil 3.1.X (Check version info in Veil at runtime)☆4,119Updated last year