DrPython3 / LuckySSH
Bruteforce tool for Pentester's lucky day targeting SSH-services.
☆13Updated 4 years ago
Alternatives and similar repositories for LuckySSH:
Users that are interested in LuckySSH are comparing it to the libraries listed below
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 4 years ago
- A SMTP Checker / SMTP Cracker with SOCKS support and e-mail delivery test (inbox check) for mailpass combolists.☆14Updated 3 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Small python or powershell script to look for potential subdomain takeover vulnerabilities via vulnerable Alias.☆8Updated 3 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Updated 2 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 3 years ago
- Searches and tests SQL dorks to find vulnerable sites.☆10Updated 5 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali now with windows support☆9Updated last month
- Some stealers in one. Simple to use.☆6Updated 4 years ago
- Generate Professional Phishing Emails Templates Fast And Easy☆14Updated 4 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆26Updated 2 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆16Updated 4 years ago
- This tool is uses for SQLI+LFI+XSS+LFI+RCE Dorking and finding vulnerable sites.☆33Updated 6 years ago
- A small and fast bash script to automate LFI vulnerability.☆11Updated 2 years ago
- Modules Prestashop Vuln Arbitrary File Upload☆10Updated 5 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.☆13Updated 4 years ago
- Jok3r - Network and Web Pentest Framework☆17Updated 5 years ago
- An Advanced tool to scan hundreds of IP's in Seconds for CVE's, Open Ports And Web Technologies.☆18Updated 2 years ago
- Extend wordlist by appending digits and special characters to each word.☆10Updated last year
- Extract Useful info from SSL VPN Directory Traversal Vulnerability (FG-IR-18-384)☆10Updated 4 years ago
- This tool can generate various types of dropper to hide your main payload☆7Updated 2 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆16Updated 4 years ago
- xdebug 2.5.5 RCE exploit☆30Updated 2 months ago
- Simple Webshell for Hackers☆9Updated 3 years ago
- 🔅 Reverse shell written on python3☆14Updated 4 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- fully Undetectable payload generator for metasploit☆11Updated 2 years ago
- Mini Wordress Exploiter using CVE2020☆31Updated 4 years ago
- AutoExploiter Wordpress , Joomla , Drupal☆17Updated 7 years ago