Nike-Inc / piggybackView external linksLinks
This tool allows you to tunnel SSH (using ProxyCommand) via HTTPS (with Squid Proxy). It is a python implementation of corkscrew, but over https (TLS) instead of http (plaintext).
☆16Jul 16, 2019Updated 6 years ago
Alternatives and similar repositories for piggyback
Users that are interested in piggyback are comparing it to the libraries listed below
Sorting:
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Nov 21, 2025Updated 2 months ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 8 months ago
- This repository contains a python3 script that is used to deploy a GNS3 topology from a YAML file using GNS3 REST API.☆14Dec 8, 2022Updated 3 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- Helping get up to speed with drone via examples☆11Feb 1, 2022Updated 4 years ago
- ☆15Sep 29, 2024Updated last year
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Mar 14, 2018Updated 7 years ago
- ☆20Apr 10, 2025Updated 10 months ago
- Using MCP is fun with Cyberbro!☆19Jan 27, 2026Updated 2 weeks ago
- A description on how to setup a Qomputor Node or Miner Node☆14Aug 24, 2023Updated 2 years ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆23Updated this week
- Forked from joomscan-owasp at 26/02/2015 to add new functionality☆14Feb 26, 2015Updated 10 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- Script to chain search parameters for MalwareBazaar☆12Jan 26, 2025Updated last year
- A list of webshells☆17Jul 1, 2023Updated 2 years ago
- Perl script to bruteforce SSH known_hosts files.☆25Jun 9, 2015Updated 10 years ago
- Training scenarios for cyber ranges☆14Apr 24, 2020Updated 5 years ago
- Real-time websocket stream of GPS events on a fancy SVG world map☆19Jan 5, 2022Updated 4 years ago
- ☆16Oct 21, 2023Updated 2 years ago
- OpenVPN server in docker that supports 2FA with password and Yubikey OTP and LDAP as backend☆15Dec 4, 2025Updated 2 months ago
- Zabbix All-In-One in Docker☆11Jan 30, 2019Updated 7 years ago
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17May 11, 2025Updated 9 months ago
- Simple PowerShell script to quickly add Windows Firewall Rules☆18Sep 14, 2017Updated 8 years ago
- Chainlink external adapter that enables SWIFT financial message data to be accessed by smart contracts via gpi API.☆13Mar 1, 2022Updated 3 years ago
- A Python-Based script designed to output stable and screen-scrapable lists of wireless networks☆15Jun 19, 2014Updated 11 years ago
- networked status aggregator sees all☆14Apr 26, 2021Updated 4 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆18Nov 22, 2022Updated 3 years ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- Web Application Vulnerability Scanner☆19Oct 18, 2018Updated 7 years ago
- Harbinger Sensor Network Project☆13Jun 8, 2015Updated 10 years ago
- ☆12Jun 6, 2023Updated 2 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago