norksec / torcrack
A simple Tor enabled, multi-process SSH dictionary attack in Python3.
☆18Updated 7 years ago
Alternatives and similar repositories for torcrack:
Users that are interested in torcrack are comparing it to the libraries listed below
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 9 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago
- hemingway is a simple and easy to use spear phishing helper.☆40Updated 8 years ago
- Terminal Ip Lookup Tool☆56Updated 10 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- WPS scan and pwn tool☆66Updated 5 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆115Updated 8 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆122Updated 7 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆44Updated 8 years ago
- Removed according to regulations☆35Updated 7 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆31Updated 6 years ago
- Poison, reset, spoof, redirect MITM script☆126Updated last year
- Simple reverse ICMP shell☆41Updated 11 years ago
- Simple security surveillance script for linux distributions.☆58Updated 8 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Updated 11 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆55Updated 6 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 2 years ago
- Smoking Linux Every Day!☆54Updated 4 years ago
- AutoBrowser Screenshot☆48Updated 8 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Stargate☆94Updated 8 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 7 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago