atarantini / sshdefaultscan
Scan networks for SSH servers with default username and password
☆12Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for sshdefaultscan
- Various pentest scripts☆14Updated 10 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆28Updated 10 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 10 years ago
- Some exploits for ZeroNights 0x03☆37Updated 9 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- XMLRPC server for password cracking☆32Updated 9 years ago
- Go command line app to exploit file upload vulnerability☆12Updated 7 years ago
- Exploit kit analyzer☆21Updated 9 years ago
- An evolving hacking framework written in python☆11Updated 9 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 6 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Updated 7 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 7 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 6 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 9 years ago
- A free and open source command-line shell and scripting language designed especially for security testing☆127Updated 11 years ago
- A simple python script to dump data from memcached servers.☆11Updated 10 years ago
- python based backdoor software☆17Updated 13 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Try various exploits to get root☆19Updated 11 years ago