screetsec / BruteSploitLinks
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
☆767Updated 5 years ago
Alternatives and similar repositories for BruteSploit
Users that are interested in BruteSploit are comparing it to the libraries listed below
Sorting:
- Tool Information Gathering Write By Python.☆743Updated 2 years ago
- Websploit is a high level MITM framework☆1,220Updated 2 years ago
- Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).☆646Updated 3 years ago
- Generate Gmail Emailing Keyloggers to Windows.☆1,134Updated 3 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆434Updated 3 years ago
- IP Tools To quickly get information about IP Address's, Web Pages and DNS records.☆495Updated 4 years ago
- A Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner☆747Updated last month
- ☆1,059Updated 3 years ago
- The New Hacking Framework☆705Updated 4 years ago
- Automatically exported from code.google.com/p/ghost-phisher☆386Updated 5 years ago
- An advanced multithreaded admin panel finder written in python.☆830Updated last year
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆441Updated 7 years ago
- Hakku Framework penetration testing☆351Updated 4 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,234Updated 3 years ago
- Community-built scenarios for Wifiphisher☆375Updated 4 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,222Updated 5 years ago
- A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs provi…☆643Updated 3 years ago
- HTTP Server for phishing in Python☆274Updated 2 years ago
- Verify if email exists☆405Updated 4 years ago
- Retrieve IP Geolocation information☆961Updated last year
- Tools for information gathering☆355Updated last year
- an easy pentesting tool.☆506Updated 3 years ago
- PowerFull Administration Tool For Linux☆192Updated 8 years ago
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,707Updated 2 years ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆935Updated 7 months ago
- This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear t…☆508Updated 7 years ago
- Hacking systems with the automation of PasteJacking attacks.☆398Updated last year
- BlackEye Phishing Kit in Python w Serveo Subdomain Creation | Educational Purposes Only☆546Updated 2 years ago
- EasySploit - Metasploit automation (EASIER and FASTER than EVER)☆379Updated 5 years ago
- Automatically brute force all services running on a target.☆2,183Updated last year