brute force SSH public-key authentication
☆78Jun 2, 2025Updated 9 months ago
Alternatives and similar repositories for sshame
Users that are interested in sshame are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Aug 9, 2019Updated 6 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Jun 2, 2016Updated 9 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆15Feb 16, 2021Updated 5 years ago
- A simple BOF that disables some logging with NtSetInformationProcess☆14Oct 13, 2023Updated 2 years ago
- Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)☆15Nov 21, 2022Updated 3 years ago
- TypeScript/JavaScript client libraries for Sliver☆25Mar 15, 2026Updated last week
- Forget "python -m SimpleHTTPServer". redhttpd implements (on top of SimpleHTTPServer) a set of useful features for Red Teaming and Penetr…☆22Jun 26, 2019Updated 6 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Aug 26, 2021Updated 4 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Jun 30, 2019Updated 6 years ago
- Transforms any file into a protected ELF executable☆29Mar 17, 2015Updated 11 years ago
- Use normal web pentest tools to hack Websockets☆18Sep 23, 2019Updated 6 years ago
- ☆38Jan 14, 2022Updated 4 years ago
- A kalilinux/kali-rolling container with extra juice.☆20Jan 5, 2026Updated 2 months ago
- All my dotfiles that I port around from system to system with me☆18Mar 15, 2026Updated last week
- Ubuntu based privateinternetaccess.com Proxy Box with Squid(http proxy), Deluge (torrenting including port mapping), Dante(Socks5)☆21Dec 19, 2024Updated last year
- Automatically spin up infra for phishing☆63Feb 1, 2020Updated 6 years ago
- Openssh backdoor found with a ssh honeypot☆27Jul 22, 2016Updated 9 years ago
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆11Jun 22, 2015Updated 10 years ago
- A ptrace POC by hooking SSH to reveal provided passwords☆188Apr 18, 2017Updated 8 years ago
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆29Oct 18, 2021Updated 4 years ago
- Parsers for .mdf file of Microsoft SQL Server (MSSQL)☆15Mar 28, 2020Updated 5 years ago
- ☆19Jan 12, 2024Updated 2 years ago
- 🐳 PyLoader: An asynchronous Python dataloader for loading big datasets, supporting PyTorch and TensorFlow 2.x.☆11Aug 29, 2021Updated 4 years ago
- 红队渗透:Harbor 公开镜像地址批量获取脚本☆11Mar 4, 2022Updated 4 years ago
- Joker Botnet Source LEAKED☆10Jun 5, 2021Updated 4 years ago
- Tool to obtain hash using MS-SNTP for user accounts☆29Jan 22, 2025Updated last year
- The program is designed to obfuscate the shellcode.☆204Jul 13, 2021Updated 4 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆139Jan 5, 2023Updated 3 years ago
- Multi Thread POST|GET (BLIND/TIME BASED/HEADER/SQL/XSS/LFI) INJECTION SCANNER☆12Jun 22, 2013Updated 12 years ago
- NTP command & control☆18Oct 14, 2020Updated 5 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Jan 11, 2023Updated 3 years ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Jan 15, 2022Updated 4 years ago