zzzteph / krakerLinks
Kraker is a distributed password brute-force system that focused on easy use.
☆82Updated 3 months ago
Alternatives and similar repositories for kraker
Users that are interested in kraker are comparing it to the libraries listed below
Sorting:
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Tool to find SMTP servers vulnerable to open relay☆82Updated 5 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassin…☆31Updated 4 years ago
- Various scripts and codes☆85Updated 4 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆53Updated 4 months ago
- Automate Metasploit scanning and exploitation☆116Updated 2 months ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆102Updated 5 years ago
- ☆47Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆107Updated 6 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆152Updated 3 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- WireBug is a toolset for Voice-over-IP penetration testing☆168Updated 3 years ago
- Unique wordlist generator of unique wordlists.☆42Updated 2 years ago
- Generate image payloads in JS to bypass filters☆39Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Create a screenshot of a remote desktop because NLA is disabled.☆39Updated 3 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆99Updated 5 years ago
- Generate users list using certain format☆23Updated 6 years ago
- Anvil Secure's Burp extension for signing AWS requests with SigV4☆21Updated last month
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated last month
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- Passwordless RDP Session Hijacking☆69Updated 4 years ago
- fsp - Firestore Database Vulnerability Scanner Using APKs☆63Updated 4 years ago
- Search (offline) if your password (NTLM or SHA1 format) has been leaked (HIBP passwords list v8)☆60Updated last year
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- Automatically run and save ffuf scans for multiple IPs☆81Updated last year