TarlogicSecurity / SaSSHimiLinks
SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels
☆110Updated 6 years ago
Alternatives and similar repositories for SaSSHimi
Users that are interested in SaSSHimi are comparing it to the libraries listed below
Sorting:
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆101Updated 6 years ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆175Updated 7 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- A bunch of useful SSH tools for powershell☆119Updated 6 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- Quickly fetch Let's Encrypt certs and serve a reverse proxy☆105Updated 3 years ago
- Modified dropbear server which acts as a client and allows authless login☆126Updated 7 years ago
- Multi-Purpose DNS Server☆144Updated 2 months ago
- CVE-2018-10933 very simple POC☆127Updated 6 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆97Updated 8 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- A testing framework for mail security and filtering solutions.☆245Updated 2 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆88Updated 8 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆88Updated 4 months ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆163Updated 5 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆145Updated 5 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆160Updated 9 years ago
- A script that automates generation of OpenSSL reverse shells☆302Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- Generate Keyboard Walk Dictionaries for cracking☆146Updated 9 years ago
- Exfiltrate data with ICMP☆103Updated 7 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆209Updated 9 years ago
- Git Web Hook Tunnel for C2☆28Updated last year
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆182Updated 3 years ago