HynekPetrak / sshameLinks
brute force SSH public-key authentication
☆77Updated 7 months ago
Alternatives and similar repositories for sshame
Users that are interested in sshame are comparing it to the libraries listed below
Sorting:
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆72Updated 4 years ago
- Custom security distro for remote penetration testing☆56Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 5 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- ☆53Updated 4 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 4 months ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Updated 4 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- Kraker is a distributed password brute-force system that focused on easy use.☆83Updated 6 months ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆28Updated 6 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆211Updated 6 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- A WLAN red team framework.☆154Updated last year
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆61Updated 4 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- ☆30Updated 5 years ago
- Custom pentesting tools☆26Updated 5 years ago
- A Golang implant that uses Slack as a command and control server☆47Updated 5 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Updated 5 years ago
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 3 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆79Updated 3 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Updated 6 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆44Updated 2 months ago