BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH
☆18May 2, 2024Updated last year
Alternatives and similar repositories for Thor
Users that are interested in Thor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Setup a AES Encrypted communication Between two machines Right from terminal☆17Sep 2, 2021Updated 4 years ago
- Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510☆18Aug 27, 2019Updated 6 years ago
- Dirty Cow implement in Go☆11Nov 3, 2016Updated 9 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆71Apr 22, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- socksh(v3.0) automatically scrapes socks5 proxies from spyones list and can then also add alive proxies to proxychains.conf file in matte…☆14Aug 9, 2021Updated 4 years ago
- CVE-2016-5195 exploit written in Crystal☆13Oct 25, 2016Updated 9 years ago
- JitterBug passively searches for Basic Info, open ports, potential CVE's on the given Target IP in third party databases without Direct i…☆13Sep 29, 2021Updated 4 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Big-Papa is a remote cookie stealer which can then be used for session hijacking and Bypassing 2 Factor Authentication☆106Mar 7, 2022Updated 4 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆39Sep 4, 2014Updated 11 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- POC exploit for SMBLost vulnerability (CVE-2020-1301)☆17Jun 13, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- an end to end encrypted chat room template, i couldnt get it working on vercel. type in the url, then whatever you put after the / will b…☆13Feb 21, 2026Updated last month
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆13Nov 28, 2018Updated 7 years ago
- ✨ Realtime drawing application.☆10Apr 9, 2023Updated 2 years ago
- gobbo-rage-mic☆21Mar 16, 2025Updated last year
- WStalker: an easy proxy☆25May 5, 2020Updated 5 years ago
- A Simple Script For SSH BruteForce☆38Aug 4, 2023Updated 2 years ago
- AI Security Research☆15Jun 21, 2023Updated 2 years ago
- Small Plex Dashboard (Should've been named Media-List...)☆16Sep 13, 2025Updated 6 months ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Jun 28, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Transform your batch (bat) script into one binary.exe☆53Feb 11, 2024Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- 🖥️ HastePaste app website (DEPRECATED)☆17May 7, 2024Updated last year
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- user profiles for opentrack☆11Dec 28, 2017Updated 8 years ago
- Powercord plugin to make user modal backgrounds look cool☆10May 31, 2021Updated 4 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆106Aug 17, 2021Updated 4 years ago
- Brute forcing login pages with SQL Injection queries with cURL☆17Feb 23, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 4 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago