DrPython3 / LuckySSHLinks
Bruteforce tool for Pentester's lucky day targeting SSH-services.
☆13Updated 4 years ago
Alternatives and similar repositories for LuckySSH
Users that are interested in LuckySSH are comparing it to the libraries listed below
Sorting:
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali now with windows support☆9Updated 4 months ago
- A SMTP Checker / SMTP Cracker with SOCKS support and e-mail delivery test (inbox check) for mailpass combolists.☆14Updated 3 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆12Updated 4 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 4 years ago
- 🔅 Reverse shell written on python3☆15Updated 4 years ago
- Searches and tests SQL dorks to find vulnerable sites.☆10Updated 5 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.☆13Updated 4 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- Very Easy Relative Backdoor Application☆12Updated 4 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Updated last year
- Steal telegram session Bypass 2fa☆18Updated 2 years ago
- Naomi is a simple OSINT and information gathering tool that can scan quickly.☆11Updated 5 years ago
- Extract Useful info from SSL VPN Directory Traversal Vulnerability (FG-IR-18-384)☆10Updated 4 years ago
- cross-platform C2 framework in python 2☆41Updated 3 years ago
- Some stealers in one. Simple to use.☆6Updated 4 years ago
- A hacking panel based in Kali tools and more! Only with educational porpuses. The author is not responsable for any damage☆12Updated 3 years ago
- Stealer of sessions of the Telegram Desktop application on windows 7, 8 and 10 🔑☆9Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- A program to steal user information through a simple link☆14Updated 2 years ago
- Modules Prestashop Vuln Arbitrary File Upload☆10Updated 5 years ago
- Leaked? 1.1 - A Checking tool for Hash codes and Passwords leaked☆13Updated 6 years ago
- Repository of tools used in my blog☆51Updated last year
- Spider or repeater to find all links.☆13Updated 4 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Updated 3 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Updated 3 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆36Updated 4 years ago