Tool for dictionary attack with fail2ban bypass.
☆10May 17, 2018Updated 7 years ago
Alternatives and similar repositories for sshdodge
Users that are interested in sshdodge are comparing it to the libraries listed below
Sorting:
- PowerShell Pass The Hash Utils☆16Dec 9, 2018Updated 7 years ago
- A tool to abuse Exchange services☆18Jun 21, 2019Updated 6 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆28Mar 2, 2019Updated 7 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆28Nov 3, 2018Updated 7 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆31Nov 8, 2018Updated 7 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Jun 13, 2019Updated 6 years ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- A Tool for Domain Flyovers☆18Nov 12, 2019Updated 6 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Nov 10, 2019Updated 6 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links wi…☆13Oct 23, 2019Updated 6 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆28Jul 11, 2019Updated 6 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆15Dec 10, 2019Updated 6 years ago
- Automated Penetration Testing Framework☆35Mar 22, 2019Updated 6 years ago
- Tutorial Dasar Codeigniter☆13Oct 3, 2019Updated 6 years ago
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- The New Hacking Framework☆18Apr 26, 2017Updated 8 years ago
- VoIPmonitor sniffer sources☆20Nov 14, 2019Updated 6 years ago
- thc-ipv6 debian package (part of https://salsa.debian.org/pkg-security-team/thc-ipv6 as of 201607)☆34Aug 3, 2017Updated 8 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆34Jun 12, 2020Updated 5 years ago
- ☆11Jun 19, 2025Updated 8 months ago
- Canadian threat feeds updated every 12 hours.☆20Updated this week
- ☆10Jul 1, 2023Updated 2 years ago
- Networking and attacking scripts.☆10Apr 20, 2017Updated 8 years ago
- A DBMS entirely written in bash script☆11Jan 25, 2025Updated last year
- CGNAT em dispositivos baseados em RouterOS☆12May 14, 2019Updated 6 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42May 6, 2020Updated 5 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- Kubernetes Fundamentals Book☆14Feb 5, 2019Updated 7 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Small script to use PIR sensor for motion estimation on motionEye☆12May 29, 2020Updated 5 years ago
- free5GC official site☆14Feb 24, 2026Updated last week
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆10Dec 2, 2021Updated 4 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago