A simple Python SSH server that reveals passwords of connecting clients
☆32Jul 7, 2017Updated 8 years ago
Alternatives and similar repositories for paSSH
Users that are interested in paSSH are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- A collection of scripts used to support an OffSecOps pipeline.☆15Jan 31, 2021Updated 5 years ago
- ☆98Feb 21, 2019Updated 7 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- RDPThief donut shellcode inject into mstsc☆88May 24, 2021Updated 4 years ago
- Stealthy In-Memory Local Password Harvester (SILPH) tool: dump LSA, SAM and DCC2 with indirect syscall☆134Dec 17, 2025Updated 3 months ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Nov 25, 2016Updated 9 years ago
- ☆11Mar 19, 2019Updated 7 years ago
- Random source codes☆26Dec 22, 2025Updated 3 months ago
- The centralized build center☆10Jan 9, 2023Updated 3 years ago
- ☆210Jan 30, 2019Updated 7 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Feb 21, 2023Updated 3 years ago
- Sysmon Config Pusher - Modernized☆34Jan 7, 2026Updated 2 months ago
- CVE-2018-15982_EXP_IE☆12Dec 12, 2018Updated 7 years ago
- Quickly Implement Mod-Rewrite in your infastructure☆86Apr 21, 2017Updated 8 years ago
- ☆76Jan 1, 2026Updated 2 months ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Oct 30, 2019Updated 6 years ago
- Learn how to get a reverse shell from JIRA application server☆24Dec 2, 2018Updated 7 years ago
- Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆114Dec 19, 2020Updated 5 years ago
- everything that does not fit elsewhere☆12Dec 27, 2017Updated 8 years ago
- 漏洞复现记录☆11Jun 18, 2019Updated 6 years ago
- ☆43Aug 1, 2019Updated 6 years ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆27Jul 11, 2025Updated 8 months ago
- Tasks from Hack Battle by SPbCTF at PHDays 9☆10Mar 20, 2021Updated 5 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- botnet frontend i wrote in a night and then improved over a few other nights☆13Apr 11, 2019Updated 6 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Switching between development and production servers☆12Mar 1, 2025Updated last year
- OFFICE DDEAUTO Payload Generation script☆128Dec 19, 2020Updated 5 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 6 years ago
- Digital Preservation Software (National Archives of Australia)☆38Jul 7, 2011Updated 14 years ago
- POC for CVE-2019-14339 Canon PRINT 2.5.5☆14Sep 15, 2019Updated 6 years ago