Repository navigation
bruteforce-attacks
- Website
- Wikipedia
SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By samsesh for termux on android
Automatically brute force all services running on a target.
An automated bitcoin wallet collider that brute forces random wallet addresses
This is an advanced script for Instagram bruteforce attacks. WARNING THIS IS A REAL TOOL!
Mnemonic seed phrase generator for crypto wallets. Bruteforce seed phrase and checking balance BTC, ETH, BNB.
The "bane" Python library stands out as a robust toolkit catering to a wide spectrum of cybersecurity and networking tasks. Its versatile range of functionalities covers various aspects, including bruteforce attacks, cryptographic methods, DDoS attacks, information gathering, botnet creation and management, and CMS vulnerability scanning and more..
Fast Modular Web Interfaces Bruteforcer
Shreder is a powerful multi-threaded SSH protocol password brute-force tool.
A high performance bitcoin address finder.
Advanced Hash Manipulation
A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.
Powerful mutable web directory fuzzer to bruteforce existing and/or hidden files or directories.
The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written in multiple (non-English) languages, common problem occurring from scraped employee name lists (e.g. from Linkedin). 2. to transliterate a wordlist that may include words/phrases written in multiple (non-Englis
yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage
A tool for collision cracking of ETH/BSC wallets
Red Login: SSH Brute-force Tools
Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities