BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH
☆18May 2, 2024Updated last year
Alternatives and similar repositories for Thor
Users that are interested in Thor are comparing it to the libraries listed below
Sorting:
- Setup a AES Encrypted communication Between two machines Right from terminal☆17Sep 2, 2021Updated 4 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Dirty Cow implement in Go☆11Nov 3, 2016Updated 9 years ago
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆13Nov 28, 2018Updated 7 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Phishing Campaign Toolkit☆11Mar 15, 2020Updated 5 years ago
- AI Security Research☆15Jun 21, 2023Updated 2 years ago
- A Simple Script For SSH BruteForce☆38Aug 4, 2023Updated 2 years ago
- JitterBug passively searches for Basic Info, open ports, potential CVE's on the given Target IP in third party databases without Direct i…☆13Sep 29, 2021Updated 4 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆39Sep 4, 2014Updated 11 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆71Apr 22, 2023Updated 2 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Sep 24, 2021Updated 4 years ago
- CVE-2016-5195 exploit written in Crystal☆13Oct 25, 2016Updated 9 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Oct 27, 2023Updated 2 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 4 years ago
- Sqli-Scanner is a python3 script written to scan websites for SQL injection vulnerabilities Features 1 Scan one website 2 Scan multiple…☆23Nov 6, 2021Updated 4 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Email-Enum searches mainstream websites and tells you if an email is registered!☆19Mar 14, 2019Updated 6 years ago
- Automated Recon Framework☆24Oct 3, 2020Updated 5 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- the venom framework is a framework made in ruby filled with tools for wireless hacking, normal terminal commands, metasploit payloads and…☆19Jun 6, 2019Updated 6 years ago
- Copy of Fresh Onions is an open source TOR spider / hidden service onion crawler☆30Jan 5, 2021Updated 5 years ago
- Android Hacking Over Wan☆23Dec 23, 2019Updated 6 years ago
- Transform your batch (bat) script into one binary.exe☆53Feb 11, 2024Updated 2 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆104Aug 17, 2021Updated 4 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- A tool for bypass certify pinning in Android apps☆25Apr 11, 2020Updated 5 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆25Jul 19, 2024Updated last year
- gobbo-rage-mic☆21Mar 16, 2025Updated 11 months ago
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Jun 28, 2020Updated 5 years ago
- A semi-automatic osint/recon framework.☆25May 22, 2024Updated last year
- Automate TikTok view submissions using Zefoy with Python and Selenium — no login required.☆41Aug 9, 2025Updated 6 months ago
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆221Jun 19, 2024Updated last year
- WStalker: an easy proxy☆25May 5, 2020Updated 5 years ago