☆146Apr 15, 2024Updated 2 years ago
Alternatives and similar repositories for JiaTansSSHAgent
Users that are interested in JiaTansSSHAgent are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Use WordPress pingback.ping to transfer files.☆16Feb 25, 2024Updated 2 years ago
- A MBR Fuzzer☆31Apr 3, 2024Updated 2 years ago
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆27Jun 3, 2024Updated last year
- ☆16May 29, 2024Updated last year
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆146Apr 2, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆80Nov 18, 2024Updated last year
- Solutions to Flare-On 10 CTF☆14Nov 11, 2023Updated 2 years ago
- ☆46Jun 1, 2025Updated 10 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated last year
- Adjusted version of the impacket-dcomexec script to work against Windows 10☆18Oct 13, 2025Updated 6 months ago
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- ☆18Jun 25, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated 2 years ago
- Example code samples from our ScriptBlock Smuggling Blog post☆94Jun 18, 2024Updated last year
- ☆38Apr 5, 2024Updated 2 years ago
- ☆24Oct 30, 2024Updated last year
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆89Jun 13, 2024Updated last year
- Universal root exploit for the linux kernel☆37Apr 30, 2024Updated last year
- Minimal setup to trigger the xz backdoor☆29Oct 19, 2024Updated last year
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆59Jun 12, 2024Updated last year
- Implementation of Indirect Syscall technique to pop a calc.exe☆112Jan 25, 2024Updated 2 years ago
- ☆13May 21, 2025Updated 10 months ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Jul 21, 2024Updated last year
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆38Feb 15, 2026Updated 2 months ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- ☆35Dec 21, 2023Updated 2 years ago
- Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing☆32Jun 6, 2024Updated last year
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Dec 20, 2023Updated 2 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.☆18Aug 31, 2018Updated 7 years ago
- ☆74Apr 8, 2024Updated 2 years ago
- notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)☆3,556Apr 3, 2024Updated 2 years ago
- ☆65Mar 15, 2024Updated 2 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago