epsylon / fuzzssh
FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.
☆16Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for fuzzssh
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆20Updated 7 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated last year
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆15Updated last year
- ☆13Updated last year
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆11Updated 2 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆12Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆54Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Bash script to generate reverse shell payloads☆20Updated last year
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 2 years ago
- Enumeration & fingerprint tool☆23Updated 8 months ago
- Install and upgrade projectdiscovery tools☆10Updated 2 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 5 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- A PowerShell script that simplifies life and therefore... phishing.☆17Updated 2 years ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆11Updated last year
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 3 months ago
- ☆25Updated 2 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 7 months ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆16Updated 2 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 6 months ago
- A collection of beautified and commented samples of malware implemented in Bash☆10Updated last year