HynekPetrak / sshameLinks
brute force SSH public-key authentication
☆75Updated this week
Alternatives and similar repositories for sshame
Users that are interested in sshame are comparing it to the libraries listed below
Sorting:
- ☆52Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 6 months ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆61Updated 3 years ago
- Automated 802.1x Bypass☆84Updated 5 years ago
- Tool to find SMTP servers vulnerable to open relay☆80Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- A Golang implant that uses Slack as a command and control server☆47Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆147Updated 3 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Updated 3 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆73Updated 3 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- Extract credentials and other useful info from network captures☆69Updated 2 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆52Updated 2 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- Repository of tools used in my blog☆51Updated last year
- Automated Tools Pentest☆7Updated 2 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Custom pentesting tools☆25Updated 4 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆208Updated 5 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- polymorphic webshells☆30Updated 7 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆54Updated 4 years ago
- Automatically spin up infra for phishing☆64Updated 5 years ago