NetSPI / sklLinks
strace keylogger PoC
☆43Updated 7 years ago
Alternatives and similar repositories for skl
Users that are interested in skl are comparing it to the libraries listed below
Sorting:
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆64Updated 9 years ago
- Masscan integrated with Shodan API☆41Updated 8 years ago
- Projects and POCs☆60Updated 11 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- IPV6 MITM attack tool☆92Updated 11 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- ☆46Updated 7 years ago
- Perl/Python modules for interfacing with Metasploit MSGRPC☆96Updated 4 years ago
- Decrypt MITM SSL RDP and save to pcap☆53Updated 11 years ago
- ☆47Updated 9 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 8 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆86Updated 5 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- ☆49Updated 9 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆35Updated 8 months ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆60Updated 5 years ago
- Some scripts for attacks on Tacacs+ protocol☆64Updated 5 years ago
- Simple development DNS server written in python☆26Updated 7 years ago
- Python object interface to requests/responses recorded by Burp Suite☆37Updated 5 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- BSidesCBR CTF docker compose files☆67Updated 5 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆93Updated 8 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆118Updated 5 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆80Updated 8 years ago
- My collection of dockerfiles☆24Updated 9 years ago