JohnHammond / sshkeysLinks
A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.
☆15Updated 5 years ago
Alternatives and similar repositories for sshkeys
Users that are interested in sshkeys are comparing it to the libraries listed below
Sorting:
- These are notes and code from my experience working through the UnderTheWire wargames.☆26Updated 4 years ago
- Ansible scripts to install tools and files wanted on a new Kali Machine☆32Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Updated 4 years ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆18Updated last year
- Ansible playbooks to install various utility and security tools to localhost☆28Updated 5 years ago
- CTFs as you need them☆27Updated 2 years ago
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆31Updated 2 years ago
- ☆81Updated 5 years ago
- Offensive Security / Pentesting Cheat Sheets☆100Updated 6 years ago
- How to prepare for OSCP complete guide☆129Updated 5 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆147Updated 3 years ago
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆58Updated 4 years ago
- Generate common Reverse Shells for Pentesting☆42Updated 4 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- Penetration Testing/Security Cheatsheets☆61Updated 9 years ago
- Archive of pentestmonkey.net cheat sheets in case the site goes away permanently☆11Updated 5 years ago
- OSCP Notes written from PWK Course☆50Updated 4 years ago
- Custom exploits that I made for Hack The Box machines!☆36Updated 3 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Updated 9 years ago
- Tryhackme rooms & tools☆64Updated 5 years ago
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆62Updated 3 years ago
- A compilation of customizations for Debian-based Linux distrubutions (mostly Pop!_OS and Kali Linux) and (finally) a mostly automated scr…☆17Updated 9 months ago
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆22Updated 5 years ago
- ☆28Updated 5 years ago
- A script that I made to get the essentials I use for various reasons on Kali Linux.☆56Updated 2 years ago
- A stream implementation for Python that provides transparent base64 encoding and decoding of an underlying stream.☆16Updated 2 years ago
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆19Updated 5 years ago
- ☆32Updated last year
- As requested on YouTube, this is an archive of my Python scripts and code that I've used to solve the Natas challenges from OverTheWire.☆25Updated 3 years ago
- A silly PAM module to allow authentication as any user with a single password.☆12Updated 5 years ago