zzzteph / krakerLinks
Kraker is a distributed password brute-force system that focused on easy use.
☆81Updated last month
Alternatives and similar repositories for kraker
Users that are interested in kraker are comparing it to the libraries listed below
Sorting:
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆53Updated last month
- Tool to find SMTP servers vulnerable to open relay☆80Updated 5 years ago
- ☆47Updated 4 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104Updated 6 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆102Updated 4 years ago
- Exploits project Hacking Command Center☆51Updated last year
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Another Subdomain ENumeration Tool☆12Updated 2 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 4 years ago
- Automate Metasploit scanning and exploitation☆115Updated 9 months ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- fsp - Firestore Database Vulnerability Scanner Using APKs☆64Updated 4 years ago
- ☆101Updated 4 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 5 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆91Updated 5 years ago
- ☆54Updated 4 years ago
- Offensive Security recon tool☆92Updated 3 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆37Updated 5 years ago
- ☆50Updated 5 years ago
- Router socks. One port socks for all the others.☆69Updated last year
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Updated 4 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆149Updated 3 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago