braindead-sec / ssh-grabber
☆15Updated 6 years ago
Alternatives and similar repositories for ssh-grabber:
Users that are interested in ssh-grabber are comparing it to the libraries listed below
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 3 months ago
- Automated 802.1x Bypass☆84Updated 4 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆63Updated last year
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆64Updated 6 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆101Updated 5 years ago
- Random Hashcat Scrips☆24Updated 4 months ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆68Updated 2 years ago
- Various XSL templates to manipulate data from NMap XML reports☆26Updated 6 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆110Updated last year
- Merge multiple nMap xml files into one☆50Updated 5 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- Various scripts and codes☆83Updated 3 years ago
- An epic web shell☆84Updated 3 weeks ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26Updated 4 years ago
- This is a bash script to bypass 802.1x NAC☆95Updated last year
- my goto docker image when playing ctfs with all the tools I need☆15Updated 3 weeks ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 5 years ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆17Updated 5 years ago
- Fully-featured spear-phishing toolkit - web front-end☆49Updated last month
- Collection of our CTF write-ups☆29Updated 4 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- ☆44Updated 7 years ago
- A CHaracter Aware Splitting Method for producing password candidates.☆41Updated 6 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆40Updated 4 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 3 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago