Top 10 SubBrute Alternative and Similar Softwares | Dec 2024

SubBrute is a DNS meta-query spider that enumerates DNS records, and subdomains.

SubBrute is a community driven project with the goal of creating the fastest, and most accurate subdomain enumeration tool. Some of the magic behind SubBrute is that it uses open resolvers as a kind of proxy to circumvent DNS rate-limiting. This design also provides a layer of anonymity, as SubBrute does not send traffic directly to the target's name servers.

1. HeatShield

HeatShield HeatShield is a network firewall management service for Linux servers. A firewall configured by HeatShield prevents unauthorized access to services running on your servers, such as SSH and MySQL. Using HeatShield, you can easily restrict access to these services so that only IP addresses you trust are allowed to communicate......

2. Toolbase.me

Toolbase.me Hacking tools for free download and tutorials for beginners and advanced. Huge collection for hackers with a large selection of checked downloads. Learn to chop!NOTE: See bottom of page for language options, which includes English.......

3. SpyLog

SpyLog lua-spylog - Execute actions based on log records......

4. Syspeace

Syspeace An autoblocker for brute force attacks primarily for Windows Servers with good information in the admin mils telling you DNS names, country of origin and username used for the attack.......

5. CrowbarDMG

CrowbarDMG crowbarDMG is a dictionary attack tool for DMG and Spareimage files for Macs. It does require 10.5 Leopard. It really wasn’t worth the trouble to redo things to work on Tiger. It is completely free, so enjoy. Be sure to read the included PDF readme file. I address an issue......

6. Cryptohaze

Cryptohaze A CUDA & OpenCL accelerated rainbow table implementation from the ground up, and a CUDA hash brute forcing tool with support for many hash types including MD5, SHA1, LM, NTLM, and lots more!......

7. reaver

reaver Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases. Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations. On average Reaver will......

8. Fern Wifi Cracker

Fern Wifi Cracker Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or ethernet based networks.......

9. SSHGuard

SSHGuard Sshguard monitors services through their logging activity. It reacts to messages about dangerous activity by blocking the source address with the local firewall. Sshguard employs a clever parser that can transparently recognize several logging formats at once (syslog, syslog-ng, metalog, multilog, raw messages), and detects attacks for many services out......

10. Denyhosts

Denyhosts The idea of denying access to SSH servers is nothing new and I was inspired by many other scripts that I discovered. However, none of them did things the way I envisioned them to. Also, they were all shell scripts which do not offer the elegance of Python.Denyhosts provides SSH......