atarantini / sshdefaultscan
Scan networks for SSH servers with default username and password
☆12Updated 9 years ago
Alternatives and similar repositories for sshdefaultscan:
Users that are interested in sshdefaultscan are comparing it to the libraries listed below
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- Various pentest scripts☆13Updated 11 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 10 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆17Updated 8 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 7 years ago
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- Go command line app to exploit file upload vulnerability☆12Updated 8 years ago
- Pastenum is a text dump enumeration tool.☆14Updated 11 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- firewall port testing tool☆12Updated 6 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- Learning Python☆9Updated 3 months ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 4 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 10 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- A simple python script to dump data from memcached servers.☆11Updated 10 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Updated 7 years ago