TarlogicSecurity / SaSSHimiLinks
SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels
☆110Updated 6 years ago
Alternatives and similar repositories for SaSSHimi
Users that are interested in SaSSHimi are comparing it to the libraries listed below
Sorting:
- Testing/collecting some container breakouts☆94Updated 6 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆101Updated 6 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Modified dropbear server which acts as a client and allows authless login☆126Updated 6 years ago
- Quickly fetch Let's Encrypt certs and serve a reverse proxy☆105Updated 3 years ago
- A bunch of useful SSH tools for powershell☆119Updated 6 years ago
- A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆88Updated 4 months ago
- Exfiltrate files via DNS☆95Updated 11 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆160Updated 9 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆181Updated 3 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆88Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆100Updated 7 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- ☆89Updated 7 years ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆175Updated 7 years ago
- Python tool to inject fake updates into unencrypted WSUS traffic☆115Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Nix Audit made easier (RHEL, CentOS)☆65Updated 3 months ago
- lterm is a small script built to install a bash hook for full terminal logging.☆55Updated 8 years ago
- SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels☆59Updated 3 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆146Updated 5 years ago
- XFLTReaT tunnelling framework☆329Updated 5 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- Generate Keyboard Walk Dictionaries for cracking☆146Updated 9 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- CVE-2018-10933 very simple POC☆127Updated 6 years ago
- proxy poc implementation of STARTTLS stripping attacks☆168Updated 3 years ago