Exploitation Framework for Embedded Devices
-
Updated
May 23, 2024 - Python
Exploitation Framework for Embedded Devices
Bruteforce attack for Instagram. Now available as a web app at https://yosemite-app.com
A powerful and useful hacker dictionary builder for a brute-force attack
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs
Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
An automated bitcoin wallet collider that brute forces random wallet addresses
Generates millions of keyword-based password mutations in seconds.
This is an advanced script for Instagram bruteforce attacks. WARNING THIS IS A REAL TOOL!
OWASP WEB Directory Scanner
Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .
Automatic Enumeration Tool based in Open Source tools
An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S01E01)
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Its a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on insta…
Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Brute Force Attack Tools Using Python
Add a description, image, and links to the bruteforce topic page so that developers can more easily learn about it.
To associate your repository with the bruteforce topic, visit your repo's landing page and select "manage topics."