braindead-sec / ssh-grabberLinks
☆17Updated 6 years ago
Alternatives and similar repositories for ssh-grabber
Users that are interested in ssh-grabber are comparing it to the libraries listed below
Sorting:
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago
- Automated 802.1x Bypass☆84Updated 5 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆103Updated 6 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- Creates and sends fake meeting invite☆64Updated 4 years ago
- ☆48Updated 6 months ago
- exfiltration/infiltration toolkit☆45Updated 7 months ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆65Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆112Updated 2 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆79Updated last year
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 6 years ago
- All kinds of tiny shells☆58Updated 2 years ago
- Extract credentials and other useful info from network captures☆70Updated 2 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆40Updated 3 months ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆110Updated last year
- ☆56Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆33Updated 3 years ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆32Updated 2 years ago
- easy-to-use payload hosting☆270Updated 3 years ago
- Various scripts and codes☆84Updated 4 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 10 months ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆42Updated 4 years ago