blasty / ssh_rapeLinks
☆38Updated 8 years ago
Alternatives and similar repositories for ssh_rape
Users that are interested in ssh_rape are comparing it to the libraries listed below
Sorting:
- LD_PRELOAD rootkit☆24Updated 11 years ago
- NMAP Patches and NSE Scripts☆19Updated 12 years ago
- SSH Based Remote Administration Tool☆103Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- A simple example of dropping a PHP backdoor on a pfSense firewall over xmlrpc.php☆20Updated 10 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30Updated 9 years ago
- Optional plugins for MITMf☆17Updated 10 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- See here:☆42Updated 13 years ago
- The Horrific Omnipotent Rootkit☆23Updated 8 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 11 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- ☆28Updated 9 years ago
- A shell / chat bot for XMPP and cloud services☆49Updated 10 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆45Updated 9 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Updated 11 years ago
- Here comes the paintrain!☆11Updated 9 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Updated 10 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago