Fast, zero-dependency credential testing tool in Go. Brute force SSH, MySQL, PostgreSQL, Redis, MongoDB, SMB, and 20+ protocols. Hydra alternative with native nerva/naabu pipeline integration.
☆228Apr 23, 2026Updated this week
Alternatives and similar repositories for brutus
Users that are interested in brutus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆85Apr 21, 2026Updated last week
- A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations.☆140Updated this week
- Notion C2 Profile for Mythic☆45Mar 3, 2026Updated last month
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆45Feb 6, 2026Updated 2 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆37Oct 1, 2025Updated 6 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆92Feb 9, 2026Updated 2 months ago
- Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)☆101Apr 4, 2026Updated 3 weeks ago
- Simple LLM service identification - translate IP:Port to Ollama, vLLM, LiteLLM, or 60+ other AI services in seconds☆64Updated this week
- ☆28Mar 14, 2026Updated last month
- A stager and implant that executes remote Web Assembly☆64Feb 4, 2026Updated 2 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- Exhaustive search and flexible filtering of Active Directory ACEs.☆78Nov 10, 2025Updated 5 months ago
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 5 months ago
- SCEP request tool for AD CS and Intune☆76Oct 24, 2025Updated 6 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- ☆59Dec 10, 2025Updated 4 months ago
- WebClientRelayUp - an universal no-fix local privilege escalation in domain-joined windows workstations in default configuration.☆82Feb 25, 2026Updated 2 months ago
- A Beacon Object File suite for Microsoft SQL Server that speaks TDS 7.4 on the wire itself☆89Apr 9, 2026Updated 2 weeks ago
- load arbitrary dlls, call any exported function, calls execute inside g0 as normal syscalls do from the traditional route, no syscall or …☆28Feb 18, 2026Updated 2 months ago
- Azure apim mini proxy☆56Feb 16, 2026Updated 2 months ago
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 7 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 6 months ago
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆107Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 6 months ago
- An example of COM hijacking using a proxy DLL.☆43Aug 17, 2021Updated 4 years ago
- Dump protected files (SAM,SYSTEM,SECURITY) by parsing the raw NTFS partition☆41Nov 11, 2025Updated 5 months ago
- A Ligolo-ng JavaScript agent working inside Chrome & Chromium-based browsers by leveraging Isolated Web Applications.☆126Mar 30, 2026Updated 3 weeks ago
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)☆138Oct 23, 2025Updated 6 months ago
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆68Dec 25, 2025Updated 4 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 9 months ago
- ☆227Mar 13, 2026Updated last month
- Reports on Driver, LSASS and other security services mitigations☆34Aug 18, 2025Updated 8 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆17Jan 4, 2026Updated 3 months ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆35Apr 13, 2026Updated 2 weeks ago
- Havoc C2 BOF port of the KslD.sys BYOVD technique. Credential extraction from lsass via physical memory — no OpenProcess, no auditable AP…☆105Updated this week
- Shellcode and In-PowerShell solution for patching AMSI via Page Guard Exceptions☆65Nov 15, 2025Updated 5 months ago
- Proof of concept for Kerberos Armoring abuse.☆83Dec 12, 2025Updated 4 months ago
- Group Policy Objects manipulation and exploitation framework☆300Dec 7, 2025Updated 4 months ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆155Jan 25, 2026Updated 3 months ago