Fast, zero-dependency credential testing tool in Go. Brute force SSH, MySQL, PostgreSQL, Redis, MongoDB, SMB, and 20+ protocols. Hydra alternative with native nerva/naabu pipeline integration.
☆252May 15, 2026Updated this week
Alternatives and similar repositories for brutus
Users that are interested in brutus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆89Apr 21, 2026Updated 3 weeks ago
- A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations.☆148Updated this week
- Notion C2 Profile for Mythic☆46Apr 30, 2026Updated 2 weeks ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆47Feb 6, 2026Updated 3 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆37Oct 1, 2025Updated 7 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆92Feb 9, 2026Updated 3 months ago
- Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)☆105Apr 4, 2026Updated last month
- Simple LLM service identification - translate IP:Port to Ollama, vLLM, LiteLLM, or 60+ other AI services in seconds☆65May 10, 2026Updated last week
- ☆28Mar 14, 2026Updated 2 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated 2 years ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆78Nov 10, 2025Updated 6 months ago
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 5 months ago
- SCEP request tool for AD CS and Intune☆76Oct 24, 2025Updated 6 months ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆59Dec 10, 2025Updated 5 months ago
- A Beacon Object File suite for Microsoft SQL Server that speaks TDS 7.4 on the wire itself☆95Apr 9, 2026Updated last month
- Set of PoC to abuse Windows minifilters functionality☆83May 1, 2026Updated 2 weeks ago
- load arbitrary dlls, call any exported function, calls execute inside g0 as normal syscalls do from the traditional route, no syscall or …☆28May 4, 2026Updated 2 weeks ago
- Azure apim mini proxy☆58Feb 16, 2026Updated 3 months ago
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 8 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 6 months ago
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆120Apr 22, 2026Updated 3 weeks ago
- An example of COM hijacking using a proxy DLL.☆43Aug 17, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 6 months ago
- Dump protected files (SAM,SYSTEM,SECURITY) by parsing the raw NTFS partition☆42Nov 11, 2025Updated 6 months ago
- A Ligolo-ng JavaScript agent working inside Chrome & Chromium-based browsers by leveraging Isolated Web Applications.☆127Mar 30, 2026Updated last month
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆68Dec 25, 2025Updated 4 months ago
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)☆138Oct 23, 2025Updated 6 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 10 months ago
- ☆230Mar 13, 2026Updated 2 months ago
- Reports on Driver, LSASS and other security services mitigations☆35Aug 18, 2025Updated 9 months ago
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆22Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆35Apr 13, 2026Updated last month
- Havoc C2 BOF port of the KslD.sys BYOVD technique. Credential extraction from lsass via physical memory — no OpenProcess, no auditable AP…☆108Apr 22, 2026Updated 3 weeks ago
- Shellcode and In-PowerShell solution for patching AMSI via Page Guard Exceptions☆71Nov 15, 2025Updated 6 months ago
- Proof of concept for Kerberos Armoring abuse.☆84Dec 12, 2025Updated 5 months ago
- Group Policy Objects manipulation and exploitation framework☆305Dec 7, 2025Updated 5 months ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆22Nov 19, 2025Updated 5 months ago
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆46Aug 10, 2025Updated 9 months ago