zzzteph / kraker
Kraker is a distributed password brute-force system that focused on easy use.
☆79Updated 3 years ago
Alternatives and similar repositories for kraker:
Users that are interested in kraker are comparing it to the libraries listed below
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- ☆47Updated 3 years ago
- Takes a URL and checks the system for the tilde enum vuln and then find the files.☆22Updated 5 years ago
- Exploits developed by Mikael Kall☆47Updated last year
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆52Updated 11 months ago
- Tool to find SMTP servers vulnerable to open relay☆79Updated 4 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆101Updated 5 years ago
- REST API backend for Reconmap☆47Updated last week
- Combined port scanning w/ Masscan's speed & Nmap's scanning features.☆147Updated 2 years ago
- Offensive Security recon tool☆92Updated 3 years ago
- notes 2016-present☆39Updated 4 years ago
- Automate Metasploit scanning and exploitation☆114Updated 4 months ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 3 years ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆155Updated 4 years ago
- A Web-UI for subdomain enumeration (subfinder)☆54Updated 4 years ago
- Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.☆45Updated 3 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago
- The objective of this Burp Suite extension is the flexible and dynamic extraction, correlation, and structured presentation of informatio…☆54Updated 2 years ago
- Burp Extension to manipulate AES encrypted payloads☆15Updated 2 years ago
- ☆99Updated 3 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆31Updated 3 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆93Updated 4 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆84Updated last year
- Add headers to all Burp requests to bypass some WAF products☆38Updated last year
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆75Updated 4 years ago
- Given a list of domains, you resolve them and get the IP addresses.☆48Updated 2 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Updated 4 years ago
- ☆52Updated 2 months ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆27Updated last year