HynekPetrak / sshame
brute force SSH public-key authentication
☆75Updated last year
Alternatives and similar repositories for sshame:
Users that are interested in sshame are comparing it to the libraries listed below
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆51Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 4 months ago
- ☆51Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 4 years ago
- An advanced graphical search engine for Exploit-DB☆117Updated 10 months ago
- Repository of tools used in my blog☆51Updated last year
- A Golang implant that uses Slack as a command and control server☆46Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Simple Karma Attack☆67Updated 4 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆28Updated 5 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago
- Selenium based web scraper to generate passwords list☆51Updated 4 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 6 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- Kusanagi is a bind and reverse shell payload generator with obfuscation and badchar support.☆22Updated 3 years ago
- Automated 802.1x Bypass☆84Updated 5 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆73Updated 3 years ago
- Anonymize your hashcat formatted files for online cracking☆29Updated 5 months ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 6 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆205Updated 5 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆112Updated 2 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆37Updated 3 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago