norksec / torcrackLinks
A simple Tor enabled, multi-process SSH dictionary attack in Python3.
☆18Updated 7 years ago
Alternatives and similar repositories for torcrack
Users that are interested in torcrack are comparing it to the libraries listed below
Sorting:
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆124Updated 7 years ago
- NoobSecToolkit is a Python Based Tool kit that brings together powerful security and anonymity tools and scripts with predefined security…☆112Updated last year
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 10 years ago
- Fetch, install and search exploit archives from exploit sites.☆115Updated last year
- The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/The…☆35Updated 5 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated 2 years ago
- Useful pentesting scripts☆83Updated 6 months ago
- Tool made to automate tasks of pentesting.☆169Updated 5 years ago
- ☆150Updated 2 years ago
- Passive Vulnerability Auditor☆133Updated 9 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆32Updated 6 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 6 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Updated 9 years ago
- scythe: account enumerator☆61Updated 12 years ago
- Script to generate malicious debian packages (debain trojans).☆119Updated 6 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆163Updated 2 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆103Updated 8 years ago
- A tool to generate graph and other output from NMAP XML files☆117Updated 6 years ago
- Quickly check credentials against multiple websites and identify instances of credential reuse☆105Updated 8 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆166Updated 5 years ago
- Pentest dropbox setup scripts for Kali Linux☆89Updated 9 years ago
- General tools and scripts i want to make public to the world.☆46Updated 6 years ago
- A unified console to perform the "kill chain" stages of attacks.☆206Updated 2 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- for the louise☆242Updated 5 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 10 years ago