☆25Dec 13, 2016Updated 9 years ago
Alternatives and similar repositories for adbrute
Users that are interested in adbrute are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Jun 11, 2016Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Network Mapping and Enumeration Framework☆22Nov 11, 2015Updated 10 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Neet - Network Enumeration and Exploitation Tool☆168Nov 30, 2016Updated 9 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆65Oct 25, 2016Updated 9 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- Poison, reset, spoof, redirect MITM script☆127Aug 5, 2023Updated 2 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Google Hack Database Web Site Scrapper w/ DB updater utility. ASP.NET MVC web utility and Windows application for generating google hack …☆11Jun 23, 2016Updated 9 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 8 years ago
- Methods of C2☆22Jul 15, 2015Updated 10 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Nov 27, 2016Updated 9 years ago
- Query and report user logons relations from MS Windows Security Events☆243Aug 9, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Git Repo and Filesystem credential scanner☆18Sep 8, 2017Updated 8 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- ☆11Apr 28, 2017Updated 8 years ago
- Run multiple PowerShell scripts concurrently in different app domains!☆35Dec 24, 2015Updated 10 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆43Sep 2, 2016Updated 9 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆311Oct 22, 2016Updated 9 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆20Mar 21, 2018Updated 8 years ago
- Perl wrapper for the capstone library☆13Mar 7, 2017Updated 9 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆140Jun 26, 2019Updated 6 years ago