TarlogicSecurity / SaSSHimi
SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels
☆109Updated 6 years ago
Alternatives and similar repositories for SaSSHimi
Users that are interested in SaSSHimi are comparing it to the libraries listed below
Sorting:
- A bunch of useful SSH tools for powershell☆119Updated 6 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆101Updated 6 years ago
- Modified dropbear server which acts as a client and allows authless login☆125Updated 6 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 8 years ago
- Quickly fetch Let's Encrypt certs and serve a reverse proxy☆103Updated 3 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels☆59Updated 3 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- Forward local or remote tcp ports through SMB pipes.☆295Updated 4 years ago
- A testing framework for mail security and filtering solutions.☆244Updated last year
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- CVE-2018-10933 very simple POC☆128Updated 6 years ago
- A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆87Updated last month
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆210Updated 9 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆387Updated 6 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- proxy poc implementation of STARTTLS stripping attacks☆167Updated 3 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- Multi-Purpose DNS Server☆144Updated last year
- ☆25Updated 7 years ago
- Liniaal - A communication extension to Ruler☆97Updated 6 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago