NinjaJc01 / ssh-honeypotLinks
SSH Honeypot that gathers creds and attempted commands
☆19Updated 4 years ago
Alternatives and similar repositories for ssh-honeypot
Users that are interested in ssh-honeypot are comparing it to the libraries listed below
Sorting:
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- ☆19Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago
- A reverse shell in PHP using Unicode encoding as variable assignment☆20Updated 4 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Want to crack passwords faster by using a wordlist that fits your 'target audience'? Use WikiRaider.☆46Updated last year
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Free Advance encryptor for Anon Cloud☆16Updated 2 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆41Updated 3 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 5 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆25Updated 5 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- ☆27Updated 5 years ago
- ☆17Updated 3 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated 2 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- ☆29Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆51Updated last year
- Fast and intuitive manager for multiple reverse shells☆86Updated 10 months ago
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overf…☆20Updated 4 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆27Updated last month
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆52Updated 5 months ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆21Updated 4 years ago
- Reverse Shell troll software☆12Updated 6 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year