HynekPetrak / sshame
brute force SSH public-key authentication
☆75Updated 10 months ago
Alternatives and similar repositories for sshame:
Users that are interested in sshame are comparing it to the libraries listed below
- ☆51Updated 3 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆71Updated 3 years ago
- Windows Keylogger in C++☆19Updated 2 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆51Updated 4 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆24Updated 6 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 2 months ago
- An advanced graphical search engine for Exploit-DB☆117Updated 8 months ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆147Updated 3 years ago
- Enumerate a target Based off of Nmap Results☆77Updated last year
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆60Updated 3 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 3 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆120Updated 4 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆52Updated 2 years ago
- Extract credentials and other useful info from network captures☆66Updated 2 years ago
- A WLAN red team framework.☆149Updated 4 months ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆40Updated 4 years ago
- Simple netcat-like binary for Windows, created with python and py2exe.☆13Updated 6 years ago
- Custom pentesting tools☆24Updated 4 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 3 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆82Updated 2 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆127Updated 3 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆65Updated 5 years ago
- A Golang implant that uses Slack as a command and control server☆46Updated 4 years ago
- PowerShell payload generator☆115Updated 3 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- Web Browser Hooking Framework. Manage, execute and assess web browser vulnerabilities☆39Updated 6 years ago
- Nmap Web Dashboard and Reporting☆34Updated 2 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆72Updated 4 years ago