HynekPetrak / sshameLinks
brute force SSH public-key authentication
☆78Updated 3 months ago
Alternatives and similar repositories for sshame
Users that are interested in sshame are comparing it to the libraries listed below
Sorting:
- A *nix Enumerator & Auto Privilege Escalation tool.☆152Updated 3 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- A collection of data exfiltration scripts for Red Team assessments.☆99Updated 5 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆209Updated 5 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- ☆53Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆73Updated 4 years ago
- Routopsy - Hacking Routers with Routers☆177Updated 4 years ago
- Custom security distro for remote penetration testing☆55Updated 4 years ago
- Password Breach API Server☆88Updated 2 months ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆78Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 4 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 4 years ago
- Simple Karma Attack☆69Updated 4 years ago
- ☆30Updated 5 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated last month
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 4 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆102Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- PowerShell payload generator☆117Updated 3 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- Automatically spin up infra for phishing☆64Updated 5 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Kraker is a distributed password brute-force system that focused on easy use.☆82Updated 3 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago