HynekPetrak / sshameView external linksLinks
brute force SSH public-key authentication
☆78Jun 2, 2025Updated 8 months ago
Alternatives and similar repositories for sshame
Users that are interested in sshame are comparing it to the libraries listed below
Sorting:
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Aug 9, 2019Updated 6 years ago
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 6 years ago
- A simple BOF that disables some logging with NtSetInformationProcess☆13Oct 13, 2023Updated 2 years ago
- A compilation of snort rules for detecting malware traffic.☆15Feb 7, 2021Updated 5 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- :e-mail: Enumerate usernames through SMTP service☆17Jun 30, 2019Updated 6 years ago
- Joker Botnet Source LEAKED☆10Jun 5, 2021Updated 4 years ago
- Windows agent for Tactical RMM☆20Oct 12, 2020Updated 5 years ago
- It's like DocBleach, but in your browser☆18Oct 24, 2019Updated 6 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Acunetix Python API☆14Jun 4, 2020Updated 5 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆13Feb 16, 2021Updated 4 years ago
- Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container☆15Dec 16, 2017Updated 8 years ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- Easy subdomain finder from a list of company names, IP ranges or domains.☆15Jan 26, 2021Updated 5 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- Simple Script to query hash databases APIs☆16Oct 27, 2018Updated 7 years ago
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆11Jun 22, 2015Updated 10 years ago
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Jan 15, 2022Updated 4 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Jun 2, 2016Updated 9 years ago
- NTP command & control☆18Oct 14, 2020Updated 5 years ago
- A simple botnet that propagates via TELNET, controlled via IRC server, can execute shell commands and launch DDoS attacks☆16Nov 24, 2017Updated 8 years ago
- All my dotfiles that I port around from system to system with me☆18Updated this week
- A kalilinux/kali-rolling container with extra juice.☆20Jan 5, 2026Updated last month
- develop 1) an on-path DNS packet injector, and 2) a passive DNS poisoning attack detector. Part 1: The DNS packet injector you are goin…☆18Apr 21, 2018Updated 7 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- Ubuntu based privateinternetaccess.com Proxy Box with Squid(http proxy), Deluge (torrenting including port mapping), Dante(Socks5)☆21Dec 19, 2024Updated last year
- API functions for Malware Research☆35Jul 9, 2019Updated 6 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- ☆12Apr 8, 2021Updated 4 years ago
- TypeScript/JavaScript client libraries for Sliver☆24Feb 27, 2023Updated 2 years ago
- This script make any windows compatible with RDP connection☆21Jul 28, 2025Updated 6 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Dec 18, 2024Updated last year
- Password manager credential recovery tool☆20Feb 20, 2019Updated 6 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆28Oct 19, 2023Updated 2 years ago