braindead-sec / ssh-grabberLinks
☆18Updated 7 years ago
Alternatives and similar repositories for ssh-grabber
Users that are interested in ssh-grabber are comparing it to the libraries listed below
Sorting:
- This is a bash script to bypass 802.1x NAC☆99Updated 2 years ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆265Updated 2 years ago
- ☆154Updated 3 weeks ago
- Evil client portion of EAP relay attack☆205Updated 2 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆192Updated 5 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆66Updated last year
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆188Updated last year
- Simple script to generate commands to achieve reverse shells.☆120Updated 4 years ago
- Script collection to bypass Network Access Control (NAC, 802.1x)☆328Updated 6 months ago
- BloodHound Docker Ready to Use☆91Updated 2 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆81Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆150Updated 2 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆243Updated 4 years ago
- easy-to-use payload hosting☆274Updated 3 years ago
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- A tool to Terraform and automate password cracking on AWS.☆85Updated 5 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆42Updated 8 months ago
- exfiltration/infiltration toolkit☆48Updated last year
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆144Updated 2 weeks ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆176Updated 5 years ago
- ☆237Updated 5 years ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Updated 8 years ago
- my goto docker image when playing ctfs with all the tools I need☆17Updated 3 weeks ago
- OneRuleToRuleThemAll... hashcat optimised rule☆100Updated 10 months ago
- Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious S…☆239Updated 2 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆25Updated 5 years ago
- Rewriting SIET to python3☆53Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 11 months ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆69Updated 3 years ago
- Cheap & Nasty Wordpress Command Execution Shell☆89Updated 6 years ago