Grab ssh keys from ssh-agent
☆221Mar 22, 2020Updated 5 years ago
Alternatives and similar repositories for sshkey-grab
Users that are interested in sshkey-grab are comparing it to the libraries listed below
Sorting:
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆176May 22, 2018Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆51Jun 13, 2018Updated 7 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- Semantic SSH RSA keys☆25Feb 25, 2014Updated 12 years ago
- ☆19Jun 29, 2012Updated 13 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- ☆20Oct 7, 2013Updated 12 years ago
- strace keylogger PoC☆44Apr 9, 2018Updated 7 years ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- A password cracking IRC bot☆18May 24, 2014Updated 11 years ago
- On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions.☆14Oct 8, 2018Updated 7 years ago
- A realistic windows testlab deployment tool☆12Feb 24, 2017Updated 9 years ago
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- PHP root (suid) reverse shell☆74Jun 22, 2017Updated 8 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Dec 15, 2012Updated 13 years ago
- A post-exploitation OS X/Linux agent written in Python 2.7☆873Aug 24, 2017Updated 8 years ago
- ☆16May 6, 2015Updated 10 years ago
- Password list character frequency analyzer that can output hashcat masks☆16May 22, 2019Updated 6 years ago
- ☆20Oct 14, 2013Updated 12 years ago
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- cobalt strike stuff I have gathered from around github☆31May 5, 2017Updated 8 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Sep 13, 2017Updated 8 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- Central Repo for Burp extensions☆150Nov 18, 2021Updated 4 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Oct 10, 2019Updated 6 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Dec 21, 2015Updated 10 years ago
- ☆33Apr 20, 2022Updated 3 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449May 25, 2022Updated 3 years ago
- NMAP Patches and NSE Scripts☆19Apr 4, 2013Updated 12 years ago
- Automated DLL Enumerator☆546Dec 21, 2017Updated 8 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Apr 22, 2018Updated 7 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- A multi-threaded Python tool to generate screenshot of websites☆31Dec 3, 2015Updated 10 years ago