andrew-d / rsshLinks
Reverse shell over SSH
☆38Updated 9 years ago
Alternatives and similar repositories for rssh
Users that are interested in rssh are comparing it to the libraries listed below
Sorting:
- Simple Zeroconf/mDNS scanner written in Go with no external dependencies☆12Updated 4 years ago
- A Golang Reverse Shell Tool With AES Dynamic Encryption☆84Updated 5 years ago
- fofa pro的sdk,go语言版本☆38Updated 5 years ago
- Golang实现的x86下的Meterpreter reverse tcp☆39Updated 5 years ago
- A reverse PTY shell in C☆104Updated 6 years ago
- 🔨Reverse Shell 备忘录☆16Updated 5 years ago
- Minimal version for https://github.com/zmap/zgrab.☆16Updated 2 years ago
- Golang version of Ghost Tunnel, or called WiFi Covert Channel☆27Updated 6 years ago
- golang的扫描框架, 支持协程池和自动调节协程个数.☆49Updated 8 years ago
- 获取系统KB补丁对于的MS号☆24Updated 6 years ago
- go-masscan is a golang library to run masscan scans, parse scan results.☆43Updated 6 years ago
- Tiny little reverse socks5 client & server☆90Updated 5 years ago
- Source code of DDG Mining Botnet tracker☆60Updated 4 years ago
- ☆17Updated 6 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Updated 7 years ago
- Extract passwords from memory with strace☆40Updated 3 years ago
- Apache Solr DataImport Handler RCE☆91Updated 6 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Updated 7 years ago
- a mini tool to dump password and NTLM hash from WDigest & MSV1_0 & tspkg, as a result of study of mimikatz☆79Updated 6 years ago
- CVE-2020-17008 splWOW64 Elevation of Privilege☆48Updated 4 years ago
- Windows10 & Windows Server 2016 LPE Exploit (use schedsvc!SchRpcSetSecurity())☆102Updated 6 years ago
- A fake JDBC driver that allows OS command execution.☆125Updated 2 years ago
- Create a hidden account☆75Updated 7 years ago
- Zabbix Jsrpc.php Injection Exploit☆25Updated 9 years ago
- WinrmCmd/WinrmShell ( Golang\PowerShell\Python)☆33Updated 4 years ago
- ☆15Updated 9 years ago
- 针对邮件协议POP3、SMTP、IMAP进行账户安全性测试☆26Updated 7 years ago
- a pass-the-hash tool☆104Updated 7 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆52Updated 6 years ago
- 安全狗sql注入绕过☆31Updated 7 years ago