Optixal / sshpwnLinks
A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing purposes only.
☆10Updated 8 years ago
Alternatives and similar repositories for sshpwn
Users that are interested in sshpwn are comparing it to the libraries listed below
Sorting:
- Password cracking utility☆53Updated 4 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- ☆15Updated 11 years ago
- Pastenum is a text dump enumeration tool.☆14Updated 11 years ago
- Here comes the paintrain!☆11Updated 9 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 8 months ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 12 years ago
- Wireless discovery and exploitation framework written in Python☆18Updated 14 years ago
- ☆11Updated 10 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆19Updated 8 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 9 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆36Updated 10 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Updated 12 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- SIP hacking tools and scripts☆23Updated 4 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Updated 5 years ago
- Exploit Pack - One step ahead☆12Updated 11 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Scripts and tools for ISM hacking☆16Updated 7 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Optional plugins for MITMf☆15Updated 10 years ago