JohnHammond / sshkeys
A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.
☆15Updated 4 years ago
Alternatives and similar repositories for sshkeys:
Users that are interested in sshkeys are comparing it to the libraries listed below
- These are notes and code from my experience working through the UnderTheWire wargames.☆26Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆15Updated 4 years ago
- ☆80Updated 4 years ago
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆32Updated last year
- ctfcli is a tool to manage Capture The Flag events and challenges☆18Updated last year
- Ansible playbooks to install various utility and security tools to localhost☆28Updated 5 years ago
- ☆28Updated 4 years ago
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆58Updated 3 years ago
- This is a small BASH script to quickly setup all the tools I would want and need on a new machine.☆146Updated 2 years ago
- Ansible scripts to install tools and files wanted on a new Kali Machine☆30Updated 5 years ago
- CTFs as you need them☆28Updated last year
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆48Updated 4 years ago
- ☆24Updated 3 years ago
- A silly PAM module to allow authentication as any user with a single password.☆12Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Updated 5 years ago
- Generate common Reverse Shells for Pentesting☆40Updated 3 years ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago
- Some Templates for Bash Scripting☆16Updated 2 years ago
- A list of Free Software network services and web applications which can be hosted locally. Selfhosting is the process of hosting and mana…☆12Updated 4 years ago
- List of Awesome Red Teaming Resources☆106Updated 6 years ago
- A Python API for Hack the Box platform interaction☆64Updated 4 years ago
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆61Updated 3 years ago
- A compilation of customizations for Debian-based Linux distrubutions (mostly Pop!_OS and Kali Linux) and (finally) a mostly automated scr…☆17Updated 4 months ago
- Compress a Python script to a command-line one-liner☆76Updated 2 years ago
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆19Updated 5 years ago
- As requested on YouTube, this is an archive of my Python scripts and code that I've used to solve the Natas challenges from OverTheWire.☆24Updated 3 years ago
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆26Updated 4 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆144Updated 3 years ago
- How to prepare for OSCP complete guide☆129Updated 5 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 5 years ago