Secure end-to-end encrypted file sharing over ssh; forked from openssh.
☆64May 5, 2022Updated 3 years ago
Alternatives and similar repositories for ironssh
Users that are interested in ironssh are comparing it to the libraries listed below
Sorting:
- A web application for running shell commands interactively on your server☆21Dec 22, 2016Updated 9 years ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 12 years ago
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 5 years ago
- Python based Office Macro Generator. Also does rudamentary obfuscation.☆12Jun 6, 2016Updated 9 years ago
- A persisted drop-in replacement for Memcached, respecting the rules of quitsies.☆16Sep 9, 2019Updated 6 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Aug 13, 2021Updated 4 years ago
- Generate users with "random-ish" realistic passwords or password hashes☆18Jun 24, 2016Updated 9 years ago
- Prophetly Server powered by Tornado and Prophet (PyPI Package)☆15Apr 15, 2017Updated 8 years ago
- Neet - Network Enumeration and Exploitation Tool☆168Nov 30, 2016Updated 9 years ago
- a retro terminal startpage☆16May 15, 2015Updated 10 years ago
- AirTask Desktop client☆18May 20, 2017Updated 8 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- Discover MSSQL Instances via UDP Scanning☆25Dec 17, 2018Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- A simple scanner to find and brute force tomcat manager logins☆27Dec 11, 2019Updated 6 years ago
- Mattermost - Shodan Slash command☆31Jan 25, 2017Updated 9 years ago
- Stop losing them, me.☆15Mar 5, 2019Updated 6 years ago
- Random source codes☆26Dec 22, 2025Updated 2 months ago
- information gathering via dorks☆400Apr 19, 2022Updated 3 years ago
- ☆25Dec 13, 2016Updated 9 years ago
- PowerShell Empire docker build☆23Jun 27, 2016Updated 9 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆57Sep 22, 2018Updated 7 years ago
- Mini Stepper Motor with Android and Arduino☆18Aug 3, 2014Updated 11 years ago
- Утилита от R-Vision для нахождения систем, уязвимых для шифровальщика WannaCry☆29May 15, 2017Updated 8 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆118Feb 25, 2023Updated 3 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- Nix Audit made easier (RHEL, CentOS)☆65Apr 22, 2025Updated 10 months ago
- Python script to detect and remove suspicious likes from Instagram☆10Oct 21, 2020Updated 5 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Updated this week
- ☆11Sep 23, 2025Updated 5 months ago
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- ☆11Jan 5, 2023Updated 3 years ago
- DBProxy - A Database Proxy Server base on MySQL☆10Sep 30, 2020Updated 5 years ago
- Expert system with deductive querying and verification of constraints expressed in natural language☆23Feb 15, 2026Updated 2 weeks ago
- SQLAlchemy bindings for WordPress☆13Oct 22, 2010Updated 15 years ago
- Bouncing DVD Logo☆11Apr 23, 2025Updated 10 months ago
- Import iOS 15 shortcuts on 13/14☆13Apr 5, 2022Updated 3 years ago