☆28Mar 31, 2023Updated 2 years ago
Alternatives and similar repositories for ssh-log-auditor
Users that are interested in ssh-log-auditor are comparing it to the libraries listed below
Sorting:
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Apr 3, 2023Updated 2 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- KaliPAKU is a training tool for penetration testing using Kali Linux. It is designed to help security professionals and engineers improve…☆37Jul 31, 2023Updated 2 years ago
- ☆31Mar 21, 2023Updated 2 years ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated 9 months ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Apr 5, 2023Updated 2 years ago
- Tool for efficient directory enumeration☆65Jan 27, 2026Updated last month
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated last month
- Still point in moving world.☆49Oct 6, 2022Updated 3 years ago
- CobaltStrike beacon written in golang☆27Apr 4, 2023Updated 2 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- A small and portable Windows C library for sandbox detection☆35Oct 2, 2023Updated 2 years ago
- A C2 framework built for my bachelors thesis☆57Jan 14, 2026Updated last month
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆70Feb 3, 2024Updated 2 years ago
- Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online persona…☆18Oct 16, 2024Updated last year
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- Exploits written while preparing for the OSED exam☆26Apr 30, 2024Updated last year
- Command & Control-Framework created for collaboration in python3☆322Aug 7, 2023Updated 2 years ago
- ☆20Jul 7, 2024Updated last year
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- ☆18Apr 3, 2023Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Aug 11, 2024Updated last year
- ☆51Oct 10, 2025Updated 4 months ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Nov 2, 2025Updated 4 months ago
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86May 5, 2023Updated 2 years ago
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated last month
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Jan 20, 2023Updated 3 years ago
- A BASH Script to automate the installation of the most popular bug bounty tools