JohnHammond / sshkeysLinks
A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.
☆15Updated 5 years ago
Alternatives and similar repositories for sshkeys
Users that are interested in sshkeys are comparing it to the libraries listed below
Sorting:
- Ansible playbooks to install various utility and security tools to localhost☆29Updated 6 years ago
- Simple script for the WHID injector - a rubberducky wifi☆115Updated last year
- ☆81Updated 5 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆150Updated 4 years ago
- Freely available programming books☆68Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Updated 5 years ago
- My write-up on TryHackMe, HackTheBox, and CTF.☆71Updated 4 years ago
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆58Updated 4 years ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆20Updated 2 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆85Updated 4 years ago
- A collection of penetration testing tools written in Python 2☆14Updated 6 years ago
- Offensive Security / Pentesting Cheat Sheets☆102Updated 7 years ago
- Compress a Python script to a command-line one-liner☆77Updated 2 years ago
- Generate common Reverse Shells for Pentesting☆42Updated 4 years ago
- A collection of python scripts that are used for network analysis and testing.☆59Updated 6 years ago
- This is a small BASH script to quickly setup all the tools I would want and need on a new machine.☆149Updated 3 years ago
- Airodump-ng WiFi Scan Visualizer☆61Updated 7 years ago
- These are notes and code from my experience working through the UnderTheWire wargames.☆26Updated 5 years ago
- OSCP Notes written from PWK Course☆52Updated 4 years ago
- Automated Recon Script for Hackthebox machines (hackthebox.eu)☆55Updated 5 years ago
- Official Black Hat Arsenal Security Tools Repository☆158Updated 3 years ago
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆34Updated 2 years ago
- Penetration Testing/Security Cheatsheets☆63Updated 10 years ago
- List of commands and techniques to while conducting any kind of hacking :)☆135Updated 2 years ago
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆156Updated last week
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- Tryhackme rooms & tools☆65Updated 5 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆98Updated this week
- Pentesting Cheatsheets and Guides☆124Updated 8 years ago
- A Python API for Hack the Box platform interaction☆63Updated 5 years ago