Fast, zero-dependency credential testing tool in Go. Brute force SSH, MySQL, PostgreSQL, Redis, MongoDB, SMB, and 20+ protocols. Hydra alternative with native nerva/naabu pipeline integration.
☆154Mar 13, 2026Updated this week
Alternatives and similar repositories for brutus
Users that are interested in brutus are comparing it to the libraries listed below
Sorting:
- A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations.☆55Updated this week
- Notion C2 Profile for Mythic☆35Mar 3, 2026Updated 2 weeks ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆88Feb 9, 2026Updated last month
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆41Feb 6, 2026Updated last month
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆37Oct 1, 2025Updated 5 months ago
- SCEP request tool for AD CS and Intune☆74Oct 24, 2025Updated 4 months ago
- Python script to leverage MSFT_MTProcess WMI class☆39Sep 17, 2025Updated 6 months ago
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆78Updated this week
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- ☆28Feb 11, 2026Updated last month
- An example of COM hijacking using a proxy DLL.☆44Aug 17, 2021Updated 4 years ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 8 months ago
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)☆132Oct 23, 2025Updated 4 months ago
- WebClientRelayUp - an universal no-fix local privilege escalation in domain-joined windows workstations in default configuration.☆75Feb 25, 2026Updated 3 weeks ago
- Reports on Driver, LSASS and other security services mitigations☆34Aug 18, 2025Updated 7 months ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆42Sep 16, 2025Updated 6 months ago
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆64Dec 25, 2025Updated 2 months ago
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆27Apr 28, 2022Updated 3 years ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 4 months ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 3 months ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- ☆16Jun 15, 2025Updated 9 months ago
- Ludus range for the Constructing Defense Lab☆113Feb 23, 2026Updated 3 weeks ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆14Jan 4, 2026Updated 2 months ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- ☆58Dec 10, 2025Updated 3 months ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Dec 19, 2020Updated 5 years ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆76Nov 10, 2025Updated 4 months ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 3 years ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- ☆17Jan 9, 2025Updated last year
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated 11 months ago
- This is practice VM for malware development☆180Nov 17, 2025Updated 4 months ago
- ☆43Jul 17, 2025Updated 8 months ago
- ☆31Aug 23, 2020Updated 5 years ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 4 months ago