yourfavDev / go-bruteLinks
An advanced brute forcer written in GO for the pen-testers willing to find a more advanced SSH brute forcer
☆15Updated 2 months ago
Alternatives and similar repositories for go-brute
Users that are interested in go-brute are comparing it to the libraries listed below
Sorting:
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆79Updated 2 years ago
- i will upload all the books that helped me in learning in this repo☆21Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your car…☆33Updated 3 months ago
- This is a working variant of the Mirai IOT botnet☆15Updated 3 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆87Updated 4 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated 2 years ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆64Updated 4 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆66Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆24Updated last year
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Updated 4 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- VLAN attacks toolkit☆12Updated 3 years ago
- All docker botnets acrued since early 2018 .... as of 2025 there is a stall in actors...tbd if updates beyond JAN 2025 will continue.☆22Updated last year
- Koadic C3 COM Command & Control - JScript RAT☆49Updated 8 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆48Updated 4 years ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆33Updated 3 years ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆102Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆41Updated 3 years ago
- Search GitHub for public Shodan api keys☆83Updated 2 years ago
- 🐢 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Sup…☆17Updated 2 months ago
- C2 server to connect to a victim machine via reverse shell☆55Updated 3 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago