JohnHammond / sshkeys
A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.
☆15Updated 5 years ago
Alternatives and similar repositories for sshkeys:
Users that are interested in sshkeys are comparing it to the libraries listed below
- Ansible playbooks to install various utility and security tools to localhost☆28Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Updated 4 years ago
- Ansible scripts to install tools and files wanted on a new Kali Machine☆30Updated 5 years ago
- These are notes and code from my experience working through the UnderTheWire wargames.☆25Updated 4 years ago
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆31Updated 2 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆37Updated 5 years ago
- A silly PAM module to allow authentication as any user with a single password.☆12Updated 5 years ago
- Archive of pentestmonkey.net cheat sheets in case the site goes away permanently☆11Updated 5 years ago
- Landing page for calebstew.art☆23Updated 3 years ago
- Journey to Try Harder !!!☆32Updated 5 years ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆18Updated last year
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆58Updated 3 years ago
- Zero-Day Code Injection and Persistence Technique☆33Updated 8 years ago
- Penetration Testing/Security Cheatsheets☆58Updated 9 years ago
- ☆81Updated 4 years ago
- OSCP Notes written from PWK Course☆47Updated 4 years ago
- ☆23Updated 3 years ago
- A Python API for Hack the Box platform interaction☆64Updated 4 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆147Updated 3 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆80Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Updated 5 years ago
- Wiki to collect Red Team infrastructure hardening resources☆20Updated 6 years ago
- CTFs as you need them☆27Updated last year
- Generate common Reverse Shells for Pentesting☆41Updated 3 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆50Updated 4 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Updated 9 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆19Updated 5 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 5 years ago