☆221Jul 20, 2020Updated 5 years ago
Alternatives and similar repositories for ssh-backdoor
Users that are interested in ssh-backdoor are comparing it to the libraries listed below
Sorting:
- ☆1,157Apr 21, 2021Updated 4 years ago
- Abusing impersonation privileges through the "Printer Bug"☆2,191Sep 10, 2020Updated 5 years ago
- Active Directory Wordlists☆111May 28, 2020Updated 5 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,255Aug 20, 2024Updated last year
- Oh-My-Tmux script for TryHackMe, HackTheBox, or other VPN practice site☆14Mar 30, 2025Updated 11 months ago
- ☆2,726Aug 7, 2024Updated last year
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,854Dec 25, 2023Updated 2 years ago
- Proof of Concept for CVE-2019-18634☆237Sep 12, 2021Updated 4 years ago
- The ultimate WinRM shell for hacking/pentesting☆5,268Feb 20, 2026Updated 2 weeks ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,384Updated this week
- Trying to tame the three-headed dog.☆4,904Nov 14, 2025Updated 3 months ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,847Sep 6, 2023Updated 2 years ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,402Feb 24, 2023Updated 3 years ago
- PensiveNotes - A note taking app☆43Jul 6, 2020Updated 5 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,779Apr 25, 2024Updated last year
- Monitor linux processes without root permissions☆5,902Updated this week
- LotusCMS 3.0 eval() Remote Command Execution☆14Feb 10, 2013Updated 13 years ago
- House of Gods Heap Exploitation Technique☆19Dec 5, 2022Updated 3 years ago
- A command line tool to search AttackerKB.☆53Jan 16, 2021Updated 5 years ago
- Windows / Linux Local Privilege Escalation Workshop☆2,054Oct 9, 2022Updated 3 years ago
- rsatool can be used to calculate RSA and RSA-CRT parameters☆1,559Jan 12, 2025Updated last year
- Various *nix tools built as statically-linked binaries☆3,619Aug 21, 2023Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,174May 11, 2023Updated 2 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆635Nov 6, 2021Updated 4 years ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,800Feb 23, 2026Updated last week
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,372Apr 23, 2025Updated 10 months ago
- Basic Website template Django 2.2 Example + Python3☆54Feb 9, 2022Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆15,515Updated this week
- Privilege Escalation Enumeration Script for Windows☆3,708Jan 30, 2026Updated last month
- SSH Honeypot that gathers creds and attempted commands☆19Apr 19, 2021Updated 4 years ago
- Multi-threaded Python Port Scanner with Nmap Integration☆387Sep 4, 2022Updated 3 years ago
- Linux privilege escalation auditing tool☆6,405Feb 19, 2026Updated 2 weeks ago
- Python Penetration Testing Tools☆17Jul 19, 2025Updated 7 months ago
- Fancy reverse and bind shell handler☆2,871Aug 9, 2024Updated last year
- Some notes about Hydra for bruteforcing☆189Mar 11, 2020Updated 5 years ago
- A tool which allows HackerOne researchers to download their reports into a local, indexed, and searchable repository☆19Sep 29, 2022Updated 3 years ago
- A flexible Boolean Based SQL injection tool☆20Nov 15, 2022Updated 3 years ago
- PHP shells that work on Linux OS, macOS, and Windows OS.☆526Feb 27, 2026Updated last week
- Test tool for CVE-2020-1472☆37Jul 1, 2023Updated 2 years ago