OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.
☆10Apr 29, 2025Updated 10 months ago
Alternatives and similar repositories for OpenSSH-Scanner
Users that are interested in OpenSSH-Scanner are comparing it to the libraries listed below
Sorting:
- DroidSniper - Misconfigured Android Debug Bridge Scanner☆14Mar 26, 2024Updated last year
- Web-See is Tool For Checkout Status Of Urls in Mass Its For Bug Bounty Hunters And Black Hat Hackers It Will Save Your Valuable Time Scr…☆15Jun 25, 2022Updated 3 years ago
- RtspBruter is a RTSP(Real Time Streaming Protocol) brute☆34Apr 27, 2020Updated 5 years ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18May 7, 2024Updated last year
- A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.☆54Mar 29, 2025Updated 11 months ago
- Bypassing File Upload Restriction using Magic Bytes☆22Jul 4, 2022Updated 3 years ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆16Mar 13, 2022Updated 3 years ago
- ☆26Jun 5, 2024Updated last year
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible pa…☆66Aug 15, 2024Updated last year
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆60Jul 7, 2024Updated last year
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- ☆11Sep 15, 2024Updated last year
- A terminal UI to monitor and query Elasticsearch.☆12May 10, 2024Updated last year
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆37Feb 11, 2026Updated 2 weeks ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆30Nov 9, 2021Updated 4 years ago
- A GUI based program for making customised crypto stealing malware written in python☆47Oct 8, 2025Updated 4 months ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Jul 21, 2024Updated last year
- CVE-2024-28955 Exploitation PoC☆34Jul 1, 2024Updated last year
- ☆18May 11, 2021Updated 4 years ago
- This MCP server provides AI assistants with direct access to Shopware's Admin API, enabling seamless product, category, order, and theme …☆23Oct 7, 2025Updated 4 months ago
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 10 months ago
- CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information☆34Jul 19, 2024Updated last year
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing☆34Aug 21, 2024Updated last year
- ☆40Jul 28, 2024Updated last year
- Small scripts to help with Linux forensics and incident response.☆56Sep 29, 2025Updated 5 months ago
- ☆11Nov 22, 2021Updated 4 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- ☆10Mar 11, 2024Updated last year
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago
- ☆13Jun 29, 2023Updated 2 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆44Mar 20, 2022Updated 3 years ago
- exploit code for F5-Big-IP (CVE-2020-5902)☆43May 22, 2023Updated 2 years ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆12Jan 19, 2024Updated 2 years ago
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Sep 15, 2022Updated 3 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Apr 26, 2018Updated 7 years ago