brute force SSH public-key authentication
☆78Jun 2, 2025Updated 11 months ago
Alternatives and similar repositories for sshame
Users that are interested in sshame are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Aug 9, 2019Updated 6 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Jun 2, 2016Updated 9 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 10 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A simple BOF that disables some logging with NtSetInformationProcess☆14Oct 13, 2023Updated 2 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆16Feb 16, 2021Updated 5 years ago
- A python based script to update DNS entries in ADIDNS☆43Apr 12, 2024Updated 2 years ago
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 8 months ago
- TypeScript/JavaScript client libraries for Sliver☆27Apr 17, 2026Updated 3 weeks ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Aug 26, 2021Updated 4 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Jun 30, 2019Updated 6 years ago
- Transforms any file into a protected ELF executable☆29Mar 17, 2015Updated 11 years ago
- ☆38Jan 14, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A kalilinux/kali-rolling container with extra juice.☆20Jan 5, 2026Updated 4 months ago
- All my dotfiles that I port around from system to system with me☆18Apr 25, 2026Updated last week
- Automatically spin up infra for phishing☆63Feb 1, 2020Updated 6 years ago
- Openssh backdoor found with a ssh honeypot☆27Jul 22, 2016Updated 9 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆28Oct 19, 2023Updated 2 years ago
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆11Jun 22, 2015Updated 10 years ago
- A ptrace POC by hooking SSH to reveal provided passwords☆188Apr 18, 2017Updated 9 years ago
- Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container☆15Dec 16, 2017Updated 8 years ago
- Joker Botnet Source LEAKED☆10Jun 5, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- The program is designed to obfuscate the shellcode.☆204Jul 13, 2021Updated 4 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆139Jan 5, 2023Updated 3 years ago
- Multi Thread POST|GET (BLIND/TIME BASED/HEADER/SQL/XSS/LFI) INJECTION SCANNER☆12Jun 22, 2013Updated 12 years ago
- NTP command & control☆17Oct 14, 2020Updated 5 years ago
- Tool to obtain hash using MS-SNTP for user accounts☆31Jan 22, 2025Updated last year
- kumpulan project pembuatan shell backdoor☆11Oct 21, 2017Updated 8 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Jan 11, 2023Updated 3 years ago
- A compilation of snort rules for detecting malware traffic.☆16Feb 7, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Acunetix Python API☆13Jun 4, 2020Updated 5 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆820Oct 27, 2023Updated 2 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆218Dec 8, 2022Updated 3 years ago
- A web shell for pivoting and lateral movement☆33Nov 29, 2017Updated 8 years ago
- Uses device manager peripheral with app context to identify the oldest bond☆10Jan 21, 2016Updated 10 years ago
- Burp extension for processing requests and responses with Python.☆10Jun 19, 2018Updated 7 years ago