☆144Apr 15, 2024Updated last year
Alternatives and similar repositories for JiaTansSSHAgent
Users that are interested in JiaTansSSHAgent are comparing it to the libraries listed below
Sorting:
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆146Apr 2, 2024Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆80Nov 18, 2024Updated last year
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆27Jun 3, 2024Updated last year
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- Use WordPress pingback.ping to transfer files.☆16Feb 25, 2024Updated 2 years ago
- ☆43Jun 1, 2025Updated 9 months ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆37Feb 15, 2026Updated 2 weeks ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated 11 months ago
- ☆16May 29, 2024Updated last year
- ☆13Dec 21, 2023Updated 2 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated last year
- ☆18Jun 25, 2024Updated last year
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated last year
- ☆38Apr 5, 2024Updated last year
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- ☆24Oct 30, 2024Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆89Jun 13, 2024Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆95Jun 18, 2024Updated last year
- Solutions to Flare-On 10 CTF☆14Nov 11, 2023Updated 2 years ago
- Adjusted version of the impacket-dcomexec script to work against Windows 10☆17Oct 13, 2025Updated 4 months ago
- See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.☆17Aug 31, 2018Updated 7 years ago
- ☆17May 22, 2021Updated 4 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆45Jul 23, 2024Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- Exploit for Grafana arbitrary file-read and RCE (CVE-2024-9264)☆130Dec 16, 2024Updated last year
- Implementation of Indirect Syscall technique to pop a calc.exe☆113Jan 25, 2024Updated 2 years ago
- Universal root exploit for the linux kernel☆38Apr 30, 2024Updated last year
- ☆30Aug 24, 2025Updated 6 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30May 7, 2024Updated last year
- ☆114Nov 19, 2023Updated 2 years ago
- XZ Backdoor Extract(Test on Ubuntu 23.10)☆17Apr 2, 2024Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆50Nov 5, 2025Updated 4 months ago
- Minimal setup to trigger the xz backdoor☆29Oct 19, 2024Updated last year