zzzteph / krakerLinks
Kraker is a distributed password brute-force system that focused on easy use.
☆81Updated 2 weeks ago
Alternatives and similar repositories for kraker
Users that are interested in kraker are comparing it to the libraries listed below
Sorting:
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆103Updated 6 years ago
- ☆47Updated 4 years ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆53Updated last month
- Automate Metasploit scanning and exploitation☆115Updated 9 months ago
- Tool to find SMTP servers vulnerable to open relay☆80Updated 5 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 11 months ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆110Updated 5 years ago
- Given a list of domains, you resolve them and get the IP addresses.☆48Updated 3 years ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Updated 5 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆81Updated 3 years ago
- Exploits developed by Mikael Kall☆47Updated 2 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Escaping Restricted Environments and Bypassing DLP☆73Updated 6 years ago
- Router socks. One port socks for all the others.☆69Updated last year
- Automated 802.1x Bypass☆86Updated 5 years ago
- Tool to manipulate and weaponize Office Open XML documents.☆72Updated 2 years ago
- polymorphic webshells☆30Updated 7 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- Ethical hacking, CTF, tools & etc☆22Updated 4 years ago
- Windows offline filesystem hacking tool for Linux☆96Updated 3 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆158Updated 4 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆27Updated last year
- fsp - Firestore Database Vulnerability Scanner Using APKs☆64Updated 4 years ago
- Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.☆47Updated 4 years ago
- ☆70Updated 4 years ago