braindead-sec / ssh-grabber
☆16Updated 6 years ago
Alternatives and similar repositories for ssh-grabber:
Users that are interested in ssh-grabber are comparing it to the libraries listed below
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 3 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- ☆17Updated 5 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 5 months ago
- ☆69Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆64Updated last year
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆102Updated 5 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Harvest Linux forensic data for operational triage of an event.☆51Updated 10 months ago
- Various XSL templates to manipulate data from NMap XML reports☆26Updated 6 years ago
- Automated 802.1x Bypass☆84Updated 5 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- Automatically exported from code.google.com/p/nipper-ng☆71Updated 2 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆109Updated 5 months ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆100Updated 6 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Merge multiple nMap xml files into one☆50Updated 5 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆111Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Various scripts and codes☆83Updated 4 years ago
- Import Nmap scans to Cherrytree☆37Updated 2 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago