NinjaJc01 / ssh-honeypotLinks
SSH Honeypot that gathers creds and attempted commands
☆19Updated 4 years ago
Alternatives and similar repositories for ssh-honeypot
Users that are interested in ssh-honeypot are comparing it to the libraries listed below
Sorting:
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- ☆19Updated 4 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆28Updated last week
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Updated 7 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 4 years ago
- Custom pentesting tools☆26Updated 5 years ago
- ☆27Updated 5 years ago
- A reverse shell in PHP using Unicode encoding as variable assignment☆19Updated 4 years ago
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated last year
- Want to crack passwords faster by using a wordlist that fits your 'target audience'? Use WikiRaider.☆45Updated last year
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- Free Advance encryptor for Anon Cloud☆16Updated 2 years ago
- Bash script to generate reverse shell payloads☆19Updated 2 years ago
- Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is abl…☆16Updated 5 years ago
- Various scripts and codes☆84Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- WebHook for Red Team☆25Updated 4 years ago
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆81Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 5 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆22Updated last year
- Transform your batch (bat) script into one binary.exe☆51Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 3 years ago
- Information-Gathering Shell Script☆29Updated 5 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Updated 6 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆25Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆66Updated 3 years ago