Wh1t3Rh1n0 / ssh-phone-home
Pentest dropbox setup scripts for Kali Linux
☆88Updated 9 years ago
Alternatives and similar repositories for ssh-phone-home:
Users that are interested in ssh-phone-home are comparing it to the libraries listed below
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 8 years ago
- ☆79Updated last year
- Bash Bunny fun!☆52Updated 6 years ago
- SSIDs for the Hak5 Wifi Pineapple's PineAP setup☆87Updated 3 years ago
- Linux setup tool for Kali Linux☆78Updated 6 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆34Updated 8 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆43Updated 9 years ago
- Bash script to fully setup your kali system.☆48Updated 5 years ago
- collection of pentest tools☆24Updated 5 years ago
- Useful pentesting scripts☆83Updated last month
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆55Updated 6 years ago
- Quick scan to find live hosts on the network/across networks☆48Updated 10 years ago
- PowerShell script to retreive wifi ESSIDs and Passwords.☆26Updated 7 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆22Updated 4 years ago
- hackpack to go with lazykali on menu application Kali Linux☆29Updated 10 years ago
- tools for analyzing strings from password lists☆58Updated 2 years ago
- Script to automate, manage, and multithread Nikto scans.☆59Updated 5 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆57Updated 6 years ago
- Powershell Reverse Rubber Ducky☆55Updated 9 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆92Updated 8 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- ☆150Updated last year
- Easy Window domain access☆51Updated 10 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆165Updated 7 years ago
- Search drives for documents containing passwords☆62Updated 10 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 9 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆140Updated 9 years ago
- ☆82Updated 5 years ago