Fast, multi-protocol credential brute-forcer. Parses Nmap, Nessus, and Nexpose output to automatically test default and custom credentials across 30+ protocols.
☆2,420May 11, 2026Updated last week
Alternatives and similar repositories for brutespray
Users that are interested in brutespray are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,720Jan 5, 2026Updated 4 months ago
- This tool can be used to brute discover GET and POST parameters☆1,396Aug 24, 2019Updated 6 years ago
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)☆3,588Apr 15, 2026Updated last month
- A Tool for Domain Flyovers☆5,931May 22, 2022Updated 3 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,495Jan 9, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,293Aug 18, 2025Updated 9 months ago
- A tool to link a domain with registered organisation names and emails, to other domains.☆848May 16, 2024Updated 2 years ago
- Vulnerability scanner based on vulners.com search API☆889Oct 1, 2025Updated 7 months ago
- Automated All-in-One OS Command Injection Exploitation Tool☆5,733May 1, 2026Updated 2 weeks ago
- A python script that finds endpoints in JavaScript files☆4,350Apr 13, 2024Updated 2 years ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,668Feb 8, 2025Updated last year
- A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.☆1,871May 20, 2024Updated last year
- ☆2,326Dec 8, 2023Updated 2 years ago
- A swiss army knife for pentesting networks☆9,134Dec 6, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DNS Takeover tool written in Go☆2,065Mar 16, 2026Updated 2 months ago
- Attack Surface Management Platform☆9,799Apr 29, 2026Updated 2 weeks ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,882May 20, 2025Updated last year
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆3,077Apr 25, 2026Updated 3 weeks ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,155Apr 21, 2024Updated 2 years ago
- A collection of tools to perform searches on GitHub.☆1,490Feb 9, 2023Updated 3 years ago
- HTTP parameter discovery suite.☆6,229Feb 20, 2025Updated last year
- SSRF (Server Side Request Forgery) testing resources☆2,494Oct 12, 2024Updated last year
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,912Jan 24, 2024Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Knock Subdomain Scan☆4,164Feb 19, 2026Updated 3 months ago
- Fast passive subdomain enumeration tool.☆13,644Updated this week
- A Powerful Subdomain Takeover Tool☆965Oct 17, 2023Updated 2 years ago
- A default credential scanner.☆1,505Jul 8, 2025Updated 10 months ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,936Sep 27, 2021Updated 4 years ago
- Command line utility for searching and downloading exploits☆1,809Sep 10, 2025Updated 8 months ago
- Wiki to collect Red Team infrastructure hardening resources☆4,480Oct 1, 2025Updated 7 months ago
- In-depth attack surface mapping and asset discovery☆14,563Apr 17, 2026Updated last month
- The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, su…☆3,737May 6, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,516Jan 21, 2020Updated 6 years ago
- Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.☆1,288Sep 12, 2025Updated 8 months ago
- File upload vulnerability scanner and exploitation tool.☆3,319May 8, 2025Updated last year
- Quick SQLMap Tamper Suggester☆1,403Jul 18, 2022Updated 3 years ago
- Fast subdomains enumeration tool for penetration testers☆10,929Aug 2, 2024Updated last year
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application☆5,051Dec 21, 2024Updated last year
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,941Apr 13, 2022Updated 4 years ago