BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH
☆18May 2, 2024Updated 2 years ago
Alternatives and similar repositories for Thor
Users that are interested in Thor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Setup a AES Encrypted communication Between two machines Right from terminal☆18Sep 2, 2021Updated 4 years ago
- Dirty Cow implement in Go☆11Nov 3, 2016Updated 9 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆72Apr 22, 2023Updated 3 years ago
- CVE-2016-5195 exploit written in Crystal☆13Oct 25, 2016Updated 9 years ago
- JitterBug passively searches for Basic Info, open ports, potential CVE's on the given Target IP in third party databases without Direct i…☆13Sep 29, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- Big-Papa is a remote cookie stealer which can then be used for session hijacking and Bypassing 2 Factor Authentication☆106Mar 7, 2022Updated 4 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆39Sep 4, 2014Updated 11 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- POC exploit for SMBLost vulnerability (CVE-2020-1301)☆17Jun 13, 2020Updated 5 years ago
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆13Nov 28, 2018Updated 7 years ago
- ✨ Realtime drawing application.☆10Apr 9, 2023Updated 3 years ago
- gobbo-rage-mic☆20Mar 16, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A tool for bypass certify pinning in Android apps☆25Apr 11, 2020Updated 6 years ago
- WStalker: an easy proxy☆25May 5, 2020Updated 6 years ago
- Small Plex Dashboard (Should've been named Media-List...)☆16Sep 13, 2025Updated 7 months ago
- Normalizer for honeypot data.☆46Jun 19, 2015Updated 10 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Jun 28, 2020Updated 5 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- user profiles for opentrack☆10Dec 28, 2017Updated 8 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆107Aug 17, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆221Jun 19, 2024Updated last year
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 4 years ago
- A really basic uploader that I've made for myself☆13Jul 22, 2020Updated 5 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Android Hacking Over Wan☆23Dec 23, 2019Updated 6 years ago
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Automated Recon Framework☆24Oct 3, 2020Updated 5 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Oct 27, 2023Updated 2 years ago
- Email-Enum searches mainstream websites and tells you if an email is registered!☆19Mar 14, 2019Updated 7 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Sep 24, 2021Updated 4 years ago
- Slack integration for MagicMirror²☆10Sep 9, 2020Updated 5 years ago
- ☆10Jan 8, 2018Updated 8 years ago