DrPython3 / LuckySSH
Bruteforce tool for Pentester's lucky day targeting SSH-services.
☆13Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for LuckySSH
- A SMTP Checker / SMTP Cracker with SOCKS support and e-mail delivery test (inbox check) for mailpass combolists.☆13Updated 2 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- Modules Prestashop Vuln Arbitrary File Upload☆10Updated 4 years ago
- Small python or powershell script to look for potential subdomain takeover vulnerabilities via vulnerable Alias.☆8Updated 3 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆11Updated 3 years ago
- Your Handy Dandy Cyber Swiss Army Knife!☆21Updated 4 years ago
- A small and fast bash script to automate LFI vulnerability.☆11Updated last year
- Spider or repeater to find all links.☆13Updated 3 years ago
- Working on a small SQL Injection framework☆17Updated last week
- Mass Exploit for CVE 2022-29464 on Carbon☆18Updated 2 years ago
- Extract Useful info from SSL VPN Directory Traversal Vulnerability (FG-IR-18-384)☆10Updated 3 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆19Updated last year
- Simple and fast web fuzzer written in python☆10Updated 4 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Updated 2 years ago
- Subdomain Scan (knockpy) in Python3☆11Updated 4 years ago
- Some stealers in one. Simple to use.☆6Updated 3 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆25Updated last year
- A minimalistic android backdoor☆14Updated 4 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Jok3r - Network and Web Pentest Framework☆16Updated 5 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.☆13Updated 4 years ago
- Very Easy Relative Backdoor Application☆12Updated 3 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago