HernanRodriguez1 / SharpBruteForceSSH
☆61Updated 10 months ago
Alternatives and similar repositories for SharpBruteForceSSH:
Users that are interested in SharpBruteForceSSH are comparing it to the libraries listed below
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆118Updated last year
- Powershell tools used for Red Team / Pentesting.☆75Updated last year
- ☆24Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆60Updated 7 months ago
- This is an AD pentest tools collection☆55Updated 8 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- PowerShell Obfuscator☆114Updated 9 months ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- CVE-2024-28955 Exploitation PoC☆34Updated 8 months ago
- quick and dirty proof-of-concept to hide shells in images☆49Updated 8 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆48Updated last week
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆75Updated 6 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆58Updated last year
- CVE-2023-7028☆59Updated last year
- Discovering Typo Squatting on your domains!☆65Updated 7 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆60Updated 5 months ago
- ☆26Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- Jasmin ransomware web panel path traversal PoC☆21Updated 11 months ago
- Automate Scoping, OSINT and Recon assessments.☆95Updated last month
- Auto exploitation tool for CVE-2024-24401.☆32Updated 6 months ago
- ProxyChecker Made in NodeJS☆36Updated 3 years ago
- ☆37Updated 2 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆39Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆93Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year