opabravo / mass-bruterView external linksLinks
Mass bruteforce authentication of common services with common credentials.
☆53Dec 2, 2023Updated 2 years ago
Alternatives and similar repositories for mass-bruter
Users that are interested in mass-bruter are comparing it to the libraries listed below
Sorting:
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆41Oct 18, 2023Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Simple Latest CVE Collector Written in Python☆59Feb 29, 2024Updated last year
- ☆13Mar 1, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated last year
- Security testing tool for analyzing HTTP 403 responses and identifying access control misconfigurations in web applications.☆166Jan 6, 2026Updated last month
- Effortlessly browse and manage your files with ease using Tiny File Manager [WH1Z-Edition], a compact single-file PHP file manager.☆25Feb 13, 2024Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 10 months ago
- BLE based C2 for Hak5's Bash Bunny☆19Oct 31, 2023Updated 2 years ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Mar 7, 2025Updated 11 months ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- PhantomCrawler is a Python-based web testing and research tool that simulates website interactions from multiple proxy IP addresses to an…☆74Jan 6, 2026Updated last month
- NetworkAssessment: Network Compromise Assessment Tool☆94May 31, 2024Updated last year
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆130Jun 1, 2024Updated last year
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- Reverse shell that can bypass windows defender detection☆170Feb 3, 2024Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆36Nov 16, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Dump files via Directory Traversal, LFI, Arbitrary File Read in a breeze with the help of ffuf☆19Dec 20, 2023Updated 2 years ago
- Powershell script to help Speed up Threat hunting incident response processes☆43Feb 3, 2024Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆127Dec 23, 2025Updated last month
- Web Path Finder☆60Nov 22, 2023Updated 2 years ago
- ☆65Apr 28, 2024Updated last year
- CVE-2023-7028☆58Jan 12, 2024Updated 2 years ago
- Basic script to generate reverse shell payloads, generally most used in ctf.☆27Mar 20, 2024Updated last year
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆44Feb 18, 2025Updated 11 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated last year
- ☆27Aug 18, 2023Updated 2 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated last year
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- ☆10Apr 1, 2025Updated 10 months ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆15Sep 10, 2024Updated last year
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆15Jun 22, 2024Updated last year
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆42Nov 4, 2023Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆57Apr 16, 2024Updated last year