TarlogicSecurity / SaSSHimi
SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels
☆109Updated 6 years ago
Alternatives and similar repositories for SaSSHimi:
Users that are interested in SaSSHimi are comparing it to the libraries listed below
- A bunch of useful SSH tools for powershell☆119Updated 6 years ago
- SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels☆58Updated 2 years ago
- Modified dropbear server which acts as a client and allows authless login☆126Updated 6 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆102Updated 5 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆178Updated 2 years ago
- A Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆86Updated 2 months ago
- Quickly fetch Let's Encrypt certs and serve a reverse proxy☆101Updated 3 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 6 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Multi-Purpose DNS Server☆144Updated last year
- Pypykatz server☆125Updated 5 years ago
- XFLTReaT tunnelling framework☆326Updated 5 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- A framework for stealthy domain reconnaissance☆298Updated 3 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- CVE-2018-10933 very simple POC☆128Updated 6 years ago
- unix wildcard attacks☆132Updated 6 years ago
- a linux process hacker tool☆83Updated 5 years ago
- Snarf man-in-the-middle / relay suite☆203Updated 8 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆385Updated 6 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆159Updated 8 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated last year
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 5 years ago
- For importing, searching, and managing public password breach data☆161Updated last year
- Exfiltrate files via DNS☆96Updated 11 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- Drupal Honeypot☆57Updated 5 years ago