praetorian-inc / brutusView external linksLinks
Fast, zero-dependency credential testing tool in Go. Brute force SSH, MySQL, PostgreSQL, Redis, MongoDB, SMB, and 20+ protocols. Hydra alternative with native fingerprintx/naabu pipeline integration.
☆13Updated this week
Alternatives and similar repositories for brutus
Users that are interested in brutus are comparing it to the libraries listed below
Sorting:
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆34Feb 6, 2026Updated last week
- ☆58Dec 10, 2025Updated 2 months ago
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆67Jan 30, 2026Updated 2 weeks ago
- ☆20Mar 12, 2025Updated 11 months ago
- AppLocker Policy Generator☆25Aug 25, 2025Updated 5 months ago
- Calling the undocumented DPAPI RPC interface directly, no more calling public CryptUnprotectData!☆73Feb 4, 2026Updated last week
- BOF template with boflink and mutator kit support☆49Jan 8, 2026Updated last month
- Go parser for maven Project Object Model (POM) file☆23Sep 3, 2022Updated 3 years ago
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆56Jan 17, 2026Updated last month
- Exhaustive search and flexible filtering of Active Directory ACEs.☆73Nov 10, 2025Updated 3 months ago
- POC tool to abuse windows server failover clusters☆54Aug 7, 2025Updated 6 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆34Oct 1, 2025Updated 4 months ago
- Block Windows Defender by deny ACL☆76Jan 12, 2026Updated last month
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆81Jan 26, 2026Updated 3 weeks ago
- ☆70Dec 26, 2025Updated last month
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆82Feb 9, 2026Updated last week
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆57Jul 2, 2025Updated 7 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆164Oct 21, 2025Updated 3 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Oct 20, 2025Updated 3 months ago
- Proof of concept for Kerberos Armoring abuse.☆78Dec 12, 2025Updated 2 months ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆81Jan 26, 2026Updated 3 weeks ago
- Microsoft Network Service Fingerprinting Tool☆67Jan 2, 2026Updated last month
- Autostart the Amazon alexa-avs-sample-app on boot on a headless Raspberry Pi☆14Mar 2, 2018Updated 7 years ago
- contains C programs that tests the effectiveness of SAST.☆12Jan 9, 2024Updated 2 years ago
- A jquery plugin which add loading indicators into buttons☆12Oct 23, 2020Updated 5 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆33Jan 27, 2026Updated 3 weeks ago
- PoC for popping a system shell against the LnvMSRIO.sys driver☆118Oct 6, 2025Updated 4 months ago
- lib for parallel & persistent job scheduling and running, like crontab but for Go☆13Feb 5, 2022Updated 4 years ago
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆94Dec 28, 2025Updated last month
- SCEP request tool for AD CS and Intune☆73Oct 24, 2025Updated 3 months ago
- ☆106Updated this week
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Sep 11, 2025Updated 5 months ago
- ☆164Oct 21, 2025Updated 3 months ago
- Build sneaky & malicious LNK files.☆159Jul 16, 2025Updated 7 months ago
- A command line tool that turns CBOR into JSON or JSON into CBOR☆13Aug 27, 2023Updated 2 years ago
- forgive me :3☆31Jan 1, 2026Updated last month
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Display custom RSS feeds on your Nova dashboard.☆14Aug 23, 2018Updated 7 years ago
- An HTTP API to any MySQL Database☆12Sep 25, 2015Updated 10 years ago