blasty / ssh_rape
☆38Updated 7 years ago
Alternatives and similar repositories for ssh_rape:
Users that are interested in ssh_rape are comparing it to the libraries listed below
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- NMAP Patches and NSE Scripts☆19Updated 11 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- A collection of publicly released whitepapers☆49Updated 7 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- A simple python script to dump data from memcached servers.☆11Updated 10 years ago
- A collection of shellcodes☆67Updated 12 years ago
- Pastenum is a text dump enumeration tool.☆14Updated 11 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- ☆15Updated 8 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- A framework for creating modular bots/backdoors☆21Updated 9 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 10 years ago
- The Horrific Omnipotent Rootkit☆22Updated 7 years ago
- An SNMPv1, v2c and v3 dictionary attack tool. Please see: https://penturalabs.wordpress.com/2016/04/01/snmpplux/☆19Updated 8 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- Python-based SMB Share scanner -- scans a bunch of computers, outputs the path and the file permissions for the account☆43Updated 7 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- ☆30Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆37Updated 4 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago