NinjaJc01 / ssh-honeypotLinks
SSH Honeypot that gathers creds and attempted commands
☆19Updated 4 years ago
Alternatives and similar repositories for ssh-honeypot
Users that are interested in ssh-honeypot are comparing it to the libraries listed below
Sorting:
- ☆20Updated 4 years ago
- A reverse shell in PHP using Unicode encoding as variable assignment☆20Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago
- ☆17Updated 3 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆25Updated 5 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆22Updated last year
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆13Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 9 months ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 4 years ago
- PowerShell payload generator☆117Updated 3 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 3 years ago
- Takes unallocated memory and fills it with junk to mess with forensics tools.☆13Updated last year
- Reverse Shell troll software☆12Updated 5 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆43Updated 4 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆26Updated last month
- Runs sshd as a unprivileged user for persistence☆12Updated 6 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 3 years ago
- Fast and intuitive manager for multiple reverse shells☆86Updated 8 months ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆76Updated 5 years ago