NetSPI / sshkey-grab
Grab ssh keys from ssh-agent
☆218Updated 4 years ago
Related projects: ⓘ
- Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)☆185Updated 5 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆92Updated 3 years ago
- Proof of Concept code for CVE-2016-5696☆101Updated 8 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆195Updated 8 years ago
- ☆235Updated 5 years ago
- Socat can be used to establish a reverse shell with bash tab completion and full shell functionality☆148Updated 8 years ago
- use ambiguous HTTP to circumvent security systems☆94Updated last year
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆172Updated last year
- proxy poc implementation of STARTTLS stripping attacks☆166Updated 2 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- libpcap based ICMP encrypted backdoor for linux.☆128Updated 3 years ago
- unix wildcard attacks☆130Updated 6 years ago
- Wolves Among the Sheep☆146Updated last year
- Proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable☆150Updated 7 years ago
- Shocker / Docker Breakout PoC☆116Updated 10 years ago
- IPv6Tools is a robust modular framework that enables the ability to visually audit an IPv6 enabled network.☆126Updated 6 years ago
- Repository holding all alternatives of *nix backdoors.☆154Updated 9 years ago
- Authenticate against a MySQL server without knowing the cleartext password☆221Updated 2 years ago
- PoC exploit for CVE-2015-5477 BIND9 TKEY assertion failure☆64Updated 9 years ago
- Published security vulnerabilities, research, and associated information.☆136Updated 4 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆210Updated 7 years ago
- ☆138Updated 8 years ago
- Modified dropbear server which acts as a client and allows authless login☆125Updated 6 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆158Updated 8 years ago
- ☆94Updated this week
- ID-spoofing NFS client☆289Updated 4 years ago
- Public repository for improvements to the EXTRABACON exploit☆158Updated 7 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 4 years ago
- ☆145Updated this week
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆263Updated 6 years ago