braindead-sec / ssh-grabberLinks
☆22Updated 7 years ago
Alternatives and similar repositories for ssh-grabber
Users that are interested in ssh-grabber are comparing it to the libraries listed below
Sorting:
- Tool to identify routers on the local LAN and paths to the Internet☆67Updated last year
- Uses Core's Impacket Library to get the password policy from a windows machine☆42Updated 9 months ago
- ☆154Updated 3 weeks ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆190Updated 2 years ago
- This is a bash script to bypass 802.1x NAC☆100Updated 2 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆192Updated 5 years ago
- Protocol agnostic online password guessing API.☆85Updated 2 years ago
- ☆238Updated 5 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 4 years ago
- BloodHound Docker Ready to Use☆91Updated 2 years ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆176Updated 5 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 4 months ago
- Lookup for interesting stuff in SMB shares☆151Updated 2 years ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆267Updated 2 years ago
- A CLI tool to identify the hash type of a given hash.☆112Updated 3 years ago
- Simple parser framework.☆26Updated 2 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Updated 4 years ago
- Evil client portion of EAP relay attack☆212Updated 2 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆143Updated 3 weeks ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 5 years ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆85Updated last year
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆80Updated 6 years ago
- A tool to Terraform and automate password cracking on AWS.☆85Updated 6 years ago
- ☄️ go-out - A Golang egress buster.☆126Updated 2 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.