Exploitation Framework for Embedded Devices
-
Updated
May 23, 2024 - Python
Exploitation Framework for Embedded Devices
Bruteforce attack for Instagram. Now available as a web app at https://yosemite-app.com
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
A powerful and useful hacker dictionary builder for a brute-force attack
An automated bitcoin wallet collider that brute forces random wallet addresses
CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs
Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
This is an advanced script for Instagram bruteforce attacks. WARNING THIS IS A REAL TOOL!
(Doesn't work anymore)
OWASP WEB Directory Scanner
Automatic Enumeration Tool based in Open Source tools
Generates millions of keyword-based password mutations in seconds.
EnigmaCracker is a tool for brute forcing crypto wallets
Its a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on insta…
Bitcoin private key brute force tool, written in python. Also can be used as a bitcoin wallet generator.
An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S01E01)
Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Add a description, image, and links to the bruteforce topic page so that developers can more easily learn about it.
To associate your repository with the bruteforce topic, visit your repo's landing page and select "manage topics."