Tool for dictionary attack with fail2ban bypass.
☆10May 17, 2018Updated 7 years ago
Alternatives and similar repositories for sshdodge
Users that are interested in sshdodge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerShell Pass The Hash Utils☆16Dec 9, 2018Updated 7 years ago
- A tool to abuse Exchange services☆18Jun 21, 2019Updated 6 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆28Mar 2, 2019Updated 7 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆28Nov 3, 2018Updated 7 years ago
- A Tool for Domain Flyovers☆18Nov 12, 2019Updated 6 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆31Nov 8, 2018Updated 7 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Jun 13, 2019Updated 6 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Nov 10, 2019Updated 6 years ago
- The New Hacking Framework☆18Apr 26, 2017Updated 8 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆28Jul 11, 2019Updated 6 years ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links wi…☆13Oct 23, 2019Updated 6 years ago
- VoIPmonitor sniffer sources☆20Nov 14, 2019Updated 6 years ago
- Automated Penetration Testing Framework☆35Mar 22, 2019Updated 7 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆15Dec 10, 2019Updated 6 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆14Jan 18, 2019Updated 7 years ago
- Tutorial Dasar Codeigniter☆13Oct 3, 2019Updated 6 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- A simple, clean status viewer for Minecraft networks☆24Feb 1, 2016Updated 10 years ago
- Small script to use PIR sensor for motion estimation on motionEye☆12May 29, 2020Updated 5 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆34Jun 12, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/windbgshark☆12Nov 3, 2015Updated 10 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 2 months ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Modules created by Nettitude for Metasploit☆11Jun 20, 2018Updated 7 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆49Jul 30, 2019Updated 6 years ago
- Plugins and signatures☆13Jun 11, 2019Updated 6 years ago
- My take on the Win10 Task Cleaner UAC bypass.☆19Mar 14, 2019Updated 7 years ago
- Networking and attacking scripts.☆10Apr 20, 2017Updated 8 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Force link all static lib symbols into .exe target, for full code coverage measure on windows.☆15Jun 14, 2015Updated 10 years ago
- A collection of open source and commercial tools that aid in red team operations.☆10Jun 12, 2019Updated 6 years ago
- Experimental kernel-level remote shell based on ICMP content☆15Aug 26, 2020Updated 5 years ago
- Simple SYSLOG client in Go☆22Jun 5, 2025Updated 9 months ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- free5GC official site☆14Mar 10, 2026Updated 2 weeks ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago