zzzteph / krakerLinks
Kraker is a distributed password brute-force system that focused on easy use.
☆81Updated 3 years ago
Alternatives and similar repositories for kraker
Users that are interested in kraker are comparing it to the libraries listed below
Sorting:
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- ☆47Updated 4 years ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆52Updated 2 weeks ago
- ☆101Updated 4 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆93Updated 5 years ago
- REST API backend for Reconmap☆46Updated this week
- Router socks. One port socks for all the others.☆69Updated last year
- Create a screenshot of a remote desktop because NLA is disabled.☆39Updated 3 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆103Updated 6 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- Automate Metasploit scanning and exploitation☆115Updated 8 months ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆156Updated 4 years ago
- ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassin…☆31Updated 4 years ago
- Tool to find SMTP servers vulnerable to open relay☆80Updated 5 years ago
- Given a list of domains, you resolve them and get the IP addresses.☆48Updated 3 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Add headers to all Burp requests to bypass some WAF products☆42Updated last year
- Generate users list using certain format☆23Updated 6 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Updated 5 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆85Updated 2 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- ☆150Updated last year
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 4 years ago
- dns rebind tool with custom scripts☆82Updated 2 years ago
- PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Or…☆96Updated 4 years ago
- An epic web shell☆84Updated 4 months ago