droberson / sshunt
SSH proxy with HASSH firewalling capabilities
☆29Updated 5 years ago
Alternatives and similar repositories for sshunt
Users that are interested in sshunt are comparing it to the libraries listed below
Sorting:
- Pretty random INTERNET syn/ack scanner, useful for finding specific alive ports for research.☆24Updated 2 years ago
- Speeding up identifying which binaries with a SUID flag may lead to root access☆14Updated 8 months ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆69Updated last year
- Simple DNS logging server☆18Updated 3 years ago
- Modified cryptsetup to enable password guessing - https://diverto.github.io/2019/11/18/Cracking-LUKS-passphrases☆17Updated 5 years ago
- ☆30Updated 5 months ago
- Multi-head SSH honeypot system.☆21Updated last year
- A vanity .onion address generator written in Go.☆16Updated 3 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- ☆27Updated 3 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆17Updated this week
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Updated 3 years ago
- Honeyscanner: A vulnerability analyzer for honeypots☆39Updated 8 months ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆13Updated last year
- A crack 💥 version of Ghostify, that helps you view Instagram stories without a trace (the story owner won't know you saw their story!)☆8Updated 2 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- 🚀 A lightweight, fast, and comprehensive solution for traffic analysis and intrusion detection.☆20Updated this week
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆67Updated 5 years ago
- Simplified NAT Slipstream server and client☆21Updated 4 years ago
- Docker environment for hackers☆15Updated 4 years ago
- Create Containerized Clearnet Proxies☆30Updated 6 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- Binary and Static Releases☆14Updated 3 weeks ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆16Updated 2 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Hackable Windows SandBox environment☆31Updated 2 years ago