NinjaJc01 / ssh-backdoorLinks
☆212Updated 5 years ago
Alternatives and similar repositories for ssh-backdoor
Users that are interested in ssh-backdoor are comparing it to the libraries listed below
Sorting:
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆291Updated 3 years ago
- ☆219Updated 5 years ago
- Active Directory Wordlists☆99Updated 5 years ago
- Some notes about Hydra for bruteforcing☆184Updated 5 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆629Updated 3 years ago
- PHP shells that work on Linux OS, macOS, and Windows OS.☆503Updated last year
- Multi-threaded Python Port Scanner with Nmap Integration☆372Updated 2 years ago
- Useful commands/tricks using smbclient/nmap in a pentesting/auditing/redteaming☆113Updated 3 years ago
- Mind maps / flow charts to help with privilege escalation on the OSCP.☆381Updated 4 years ago
- WhiteWinterWolf's PHP web shell☆690Updated 7 years ago
- ☆240Updated 10 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆209Updated 5 years ago
- A script that you can run in the background!☆180Updated 5 years ago
- List of Stuff I did to get through the OSCP :D☆282Updated 2 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,385Updated this week
- Proof of Concept for CVE-2019-18634☆218Updated 3 years ago
- A collection of commands and tools used for conducting enumeration during my OSCP journey☆123Updated 4 years ago
- Notes compiled for the OSCP exam.☆155Updated 3 years ago
- ☆165Updated 3 months ago
- Collection of reverse shells for red team operations.☆507Updated 4 months ago
- Write-Ups for HackTheBox☆108Updated 2 years ago
- ☆56Updated 6 years ago
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆145Updated last year
- Create a list of possible usernames for bruteforcing☆72Updated last year
- Writeups for vulnerable machines.☆175Updated 2 years ago
- SSTI Payload Generator☆91Updated 2 years ago
- ☆355Updated 4 years ago
- Aspx reverse shell☆112Updated 5 years ago
- Simple and accurate guide for linux privilege escalation tactics☆228Updated last year
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,197Updated last year