JohnHammond / sshkeys
A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.
☆15Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for sshkeys
- Ansible playbooks to install various utility and security tools to localhost☆28Updated 5 years ago
- A stream implementation for Python that provides transparent base64 encoding and decoding of an underlying stream.☆16Updated last year
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆32Updated last year
- A silly PAM module to allow authentication as any user with a single password.☆12Updated 4 years ago
- These are notes and code from my experience working through the UnderTheWire wargames.☆26Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆15Updated 4 years ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆18Updated last year
- As requested on YouTube, this is an archive of my Python scripts and code that I've used to solve the Natas challenges from OverTheWire.☆25Updated 2 years ago
- ☆28Updated 4 years ago
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆59Updated 3 years ago
- A collection of python scripts that are used for network analysis and testing.☆57Updated 5 years ago
- ☆24Updated 2 years ago
- Ansible scripts to install tools and files wanted on a new Kali Machine☆29Updated 5 years ago
- CTFs as you need them☆28Updated last year
- Compress a Python script to a command-line one-liner☆75Updated last year
- A list of web application security☆78Updated 6 years ago
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆18Updated 4 years ago
- OSCP Notes written from PWK Course☆45Updated 3 years ago
- Tryhackme rooms & tools☆61Updated 4 years ago
- A collection of penetration testing tools written in Python 2☆15Updated 5 years ago
- This is a clone of the of Introduction To Linux repo that I developed for the class I taught at the US Coast Guard Academy.☆64Updated 6 years ago
- A list of web application security☆92Updated 5 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Updated 4 years ago
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆20Updated 5 years ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆36Updated 5 years ago
- Offensive Security / Pentesting Cheat Sheets☆96Updated 6 years ago
- Freely available programming books☆67Updated 6 years ago
- Airodump-ng WiFi Scan Visualizer☆56Updated 6 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆46Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆21Updated 2 years ago